watchdog: BUG: soft lockup - CPU#0 stuck for 134s! [syz-executor1:17747] Modules linked in: irq event stamp: 2965808 hardirqs last enabled at (2965807): [<00000000fffefc2d>] snd_pcm_stream_unlock_irq+0x78/0xe0 sound/core/pcm_native.c:166 hardirqs last disabled at (2965808): [<0000000056e79d6e>] apic_timer_interrupt+0xa4/0xb0 arch/x86/entry/entry_64.S:920 softirqs last enabled at (877386): [<00000000518ef2d7>] __do_softirq+0x637/0x99f kernel/softirq.c:311 softirqs last disabled at (877307): [<000000002e89ba84>] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (877307): [<000000002e89ba84>] irq_exit+0x1cc/0x200 kernel/softirq.c:405 CPU: 0 PID: 17747 Comm: syz-executor1 Not tainted 4.15.0-rc6-next-20180103+ #87 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bytes_is_nonzero mm/kasan/kasan.c:166 [inline] RIP: 0010:memory_is_nonzero mm/kasan/kasan.c:184 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:210 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0x61/0x190 mm/kasan/kasan.c:267 RSP: 0018:ffff8801bbf87900 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff11 RAX: fffff520002eeeaa RBX: ffffc90001777557 RCX: ffffffff83b7d61e RDX: 0000000000000001 RSI: 0000000000000002 RDI: ffffc90001777556 RBP: ffff8801bbf87910 R08: 1ffff920002eeeaa R09: fffff520002eeeaa R10: 0000000000000001 R11: fffff520002eeeaa R12: fffff520002eeeab R13: ffff8801bbf87a00 R14: ffff8801d13c9300 R15: dffffc0000000000 FS: 00007fbf0bcad700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020ecc000 CR3: 00000001c13aa004 CR4: 00000000001606f0 DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: memcpy+0x37/0x50 mm/kasan/kasan.c:303 memcpy include/linux/string.h:344 [inline] cvt_s16_to_native sound/core/oss/mulaw.c:164 [inline] mulaw_decode+0x50e/0x740 sound/core/oss/mulaw.c:195 mulaw_transfer+0x222/0x270 sound/core/oss/mulaw.c:273 snd_pcm_plug_write_transfer+0x20b/0x390 sound/core/oss/pcm_plugin.c:611 snd_pcm_oss_write2+0x22e/0x3c0 sound/core/oss/pcm_oss.c:1310 snd_pcm_oss_write1 sound/core/oss/pcm_oss.c:1371 [inline] snd_pcm_oss_write+0x4c1/0x690 sound/core/oss/pcm_oss.c:2645 __vfs_write+0xef/0x740 fs/read_write.c:480 vfs_write+0x189/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xd4/0x1a0 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007fbf0bcacc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 000000000071bf58 RCX: 0000000000452ac9 RDX: 00000000fffffee4 RSI: 0000000020735ee0 RDI: 0000000000000015 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006eed30 R13: 00000000ffffffff R14: 00007fbf0bcad6d4 R15: 0000000000000004 Code: 89 f8 49 c1 e8 03 49 89 db 49 c1 eb 03 4d 01 cb 4d 01 c1 4d 8d 63 01 4c 89 c8 4d 89 e2 4d 29 ca 49 83 fa 10 7f 3d 4d 85 d2 74 33 <41> 80 39 00 75 21 48 b8 01 00 00 00 00 fc ff df 4d 01 d1 49 01