watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [syz-executor.5:1025] Modules linked in: irq event stamp: 7068173 hardirqs last enabled at (7068172): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (7068172): [] _raw_spin_unlock_irqrestore+0x79/0xe0 kernel/locking/spinlock.c:184 hardirqs last disabled at (7068173): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (7062290): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (7062293): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (7062293): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 0 PID: 1025 Comm: syz-executor.5 Not tainted 4.19.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0xa3/0xe0 kernel/locking/spinlock.c:184 Code: 48 c7 c0 48 82 f1 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 2f 48 83 3d dc 88 d9 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb b2 e8 9b 43 e8 f8 eb c0 0f 0b 0f 0b 48 c7 c7 48 RSP: 0018:ffff8880ba007c28 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff13e3049 RBX: 0000000000000282 RCX: 1ffff1101600c54a RDX: dffffc0000000000 RSI: ffff8880b0062a30 RDI: 0000000000000282 RBP: ffff8880ba022b00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000022b00 R14: 0000000000000000 R15: ffff8880ba022b00 FS: 00007fe8bc308700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c0130f20b0 CR3: 00000000469af000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __mod_timer kernel/time/timer.c:1071 [inline] mod_timer+0x4ea/0x1010 kernel/time/timer.c:1114 call_timer_fn+0x177/0x700 kernel/time/timer.c:1338 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:535 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:__read_once_size include/linux/compiler.h:261 [inline] RIP: 0010:compound_head include/linux/page-flags.h:142 [inline] RIP: 0010:PageAnon include/linux/page-flags.h:418 [inline] RIP: 0010:mm_counter include/linux/mm.h:1646 [inline] RIP: 0010:zap_pte_range mm/memory.c:1349 [inline] RIP: 0010:zap_pmd_range mm/memory.c:1452 [inline] RIP: 0010:zap_pud_range mm/memory.c:1481 [inline] RIP: 0010:zap_p4d_range mm/memory.c:1502 [inline] RIP: 0010:unmap_page_range+0x1183/0x2a70 mm/memory.c:1523 Code: e3 20 31 ff 89 de e8 dc f9 d6 ff 85 db 0f 85 90 07 00 00 e8 5f f8 d6 ff 48 89 e8 48 c1 e8 03 42 80 3c 30 00 0f 85 49 16 00 00 <49> 8b 45 08 31 ff 4c 89 eb 49 89 c4 48 89 84 24 c0 00 00 00 41 83 RSP: 0018:ffff88802464f848 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 1ffffd4000276871 RBX: 0000000000000000 RCX: ffffc9001057e000 RDX: 0000000000040000 RSI: ffffffff818b6611 RDI: 0000000000000005 RBP: ffffea00013b4388 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000000 R13: ffffea00013b4380 R14: dffffc0000000000 R15: 00007fe8bcbb8000 unmap_single_vma+0x198/0x300 mm/memory.c:1568 unmap_vmas+0xa9/0x180 mm/memory.c:1598 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 dup_mm kernel/fork.c:1300 [inline] copy_mm kernel/fork.c:1340 [inline] copy_process.part.0+0x662a/0x8260 kernel/fork.c:1912 copy_process kernel/fork.c:1709 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2218 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4665f9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe8bc308188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00000000004bfce1 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffc5c13d14f R14: 00007fe8bc308300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 30793 Comm: syz-executor.0 Not tainted 4.19.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline] RIP: 0010:smp_call_function_single+0x1e0/0x420 kernel/smp.c:302 Code: 00 48 8b 4c 24 08 48 8b 54 24 10 48 8d 74 24 40 8b 7c 24 1c e8 a1 f9 ff ff 41 89 c5 eb 07 e8 c7 00 0a 00 f3 90 44 8b 64 24 58 <31> ff 41 83 e4 01 44 89 e6 e8 22 02 0a 00 45 85 e4 75 e1 e8 a8 00 RSP: 0018:ffff888046e2f720 EFLAGS: 00000293 RAX: ffff88809b15a540 RBX: 1ffff11008dc5ee8 RCX: ffffffff81585dbe RDX: 0000000000000000 RSI: ffffffff81585da9 RDI: 0000000000000005 RBP: ffff888046e2f7e8 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000003 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000002 FS: 00007fb56f109700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c013074250 CR3: 00000000978c5000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: smp_call_function_many+0x743/0x8d0 kernel/smp.c:434 smp_call_function kernel/smp.c:492 [inline] on_each_cpu+0x47/0x240 kernel/smp.c:602 flush_tlb_kernel_range+0x7f/0xe0 arch/x86/mm/tlb.c:762 __purge_vmap_area_lazy+0x110/0x280 mm/vmalloc.c:681 try_purge_vmap_area_lazy mm/vmalloc.c:702 [inline] free_vmap_area_noflush+0xd4/0x100 mm/vmalloc.c:734 free_unmap_vmap_area mm/vmalloc.c:747 [inline] remove_vm_area+0x263/0x2f0 mm/vmalloc.c:1495 __vunmap+0x187/0x3f0 mm/vmalloc.c:1523 vfree+0x65/0x100 mm/vmalloc.c:1598 kcov_put kernel/kcov.c:237 [inline] kcov_put+0x1f/0x30 kernel/kcov.c:234 kcov_close+0xc/0x10 kernel/kcov.c:323 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 exit_task_work include/linux/task_work.h:22 [inline] do_exit+0xbf3/0x2be0 kernel/exit.c:870 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4665f9 Code: ee 10 44 31 c6 8d 04 37 49 89 d0 48 99 48 f7 f9 89 bb 20 01 00 00 89 b3 24 01 00 00 48 85 d2 74 0a 48 8b 6c 24 18 48 83 c4 20 4c 89 04 24 48 8b 44 24 30 48 ff c0 48 89 44 24 08 48 c7 44 24 RSP: 002b:00007fb56f109218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000056bf68 RCX: 00000000004665f9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf68 RBP: 000000000056bf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf6c R13: 00007ffc96aed78f R14: 00007fb56f109300 R15: 0000000000022000