watchdog: BUG: soft lockup - CPU#0 stuck for 128s! [syz.1.3063:8695] Modules linked in: CPU: 0 PID: 8695 Comm: syz.1.3063 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:slab_alloc_node mm/slub.c:2889 [inline] RIP: 0010:slab_alloc mm/slub.c:2955 [inline] RIP: 0010:__kmalloc_track_caller+0xf6/0x320 mm/slub.c:4536 Code: 00 65 48 ff 08 e8 3a f0 af ff e9 af 00 00 00 4d 85 ed 0f 84 a6 00 00 00 4c 8b 65 c0 0f 1f 44 00 00 49 8b 45 00 65 48 8b 50 08 <49> 8b 45 00 65 48 03 05 5e 48 5a 7e 48 3b 50 08 75 e5 48 8b 38 48 RSP: 0018:ffffc90000007b20 EFLAGS: 00000282 RAX: 0000000000059b20 RBX: 0000000000082a20 RCX: 0000000000000000 RDX: 000000000007d368 RSI: 0000000000000200 RDI: ffffffff8683aca0 RBP: ffffc90000007b70 R08: 0000000000000140 R09: ffff888133408780 R10: 0000000000000000 R11: 00000000e45572db R12: ffffffff842c8693 R13: ffff888100043080 R14: 0000000000082a20 R15: 0000000000000200 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f58be22cd60 CR3: 0000000132b22000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __kmalloc_reserve net/core/skbuff.c:143 [inline] __alloc_skb+0xbc/0x510 net/core/skbuff.c:211 alloc_skb include/linux/skbuff.h:1126 [inline] ndisc_alloc_skb+0xf3/0x2d0 net/ipv6/ndisc.c:421 ndisc_send_rs+0x26c/0x6a0 net/ipv6/ndisc.c:687 addrconf_rs_timer+0x2d1/0x600 net/ipv6/addrconf.c:3962 call_timer_fn+0x3b/0x2d0 kernel/time/timer.c:1450 expire_timers kernel/time/timer.c:1495 [inline] __run_timers+0x72a/0xa10 kernel/time/timer.c:1789 run_timer_softirq+0x69/0xf0 kernel/time/timer.c:1802 __do_softirq+0x268/0x5bb kernel/softirq.c:309 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:405 [inline] __irq_exit_rcu+0x128/0x150 kernel/softirq.c:435 irq_exit_rcu+0x9/0x10 kernel/softirq.c:447 sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1094 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635 RIP: 0010:__tlb_remove_page_size+0x6a/0x300 mm/mmu_gather.c:81 Code: 0c a0 07 00 48 89 5d c8 4c 89 75 c0 49 8b 1e 48 8d 7b 08 48 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 f0 01 00 00 8b 43 08 <44> 8d 68 01 44 89 6b 08 4c 8d 74 c3 10 4c 89 f0 48 c1 e8 03 42 80 RSP: 0018:ffffc90000dcf490 EFLAGS: 00000246 RAX: 0000000000000077 RBX: ffff8881238bd000 RCX: ffff88810d6762c0 RDX: 0000000000000000 RSI: ffffea00042e5340 RDI: ffff8881238bd008 RBP: ffffc90000dcf4d0 R08: ffffffff819d7162 R09: fffff9400085ca6f R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: ffffea00042e5340 R14: ffffc90000dcf8c8 R15: ffffea00042e5340 __tlb_remove_page include/asm-generic/tlb.h:442 [inline] zap_pte_range mm/memory.c:1319 [inline] zap_pmd_range mm/memory.c:1435 [inline] zap_pud_range mm/memory.c:1464 [inline] zap_p4d_range mm/memory.c:1485 [inline] unmap_page_range+0x121b/0x23b0 mm/memory.c:1506 unmap_single_vma mm/memory.c:1551 [inline] unmap_vmas+0x37f/0x4f0 mm/memory.c:1583 exit_mmap+0x2f2/0x5c0 mm/mmap.c:3355 __mmput+0x95/0x2d0 kernel/fork.c:1153 mmput+0x59/0x170 kernel/fork.c:1176 exit_mm kernel/exit.c:537 [inline] do_exit+0xbda/0x2a50 kernel/exit.c:848 do_group_exit+0x141/0x310 kernel/exit.c:983 get_signal+0x10a0/0x1410 kernel/signal.c:2782 arch_do_signal_or_restart+0xbd/0x17c0 arch/x86/kernel/signal.c:805 handle_signal_work kernel/entry/common.c:145 [inline] exit_to_user_mode_loop+0x9b/0xd0 kernel/entry/common.c:169 exit_to_user_mode_prepare kernel/entry/common.c:199 [inline] syscall_exit_to_user_mode+0xa2/0x1a0 kernel/entry/common.c:274 do_syscall_64+0x40/0x70 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7f271839fd39 Code: Unable to access opcode bytes at RIP 0x7f271839fd0f. RSP: 002b:00007f2717621048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: fffffffffffffff5 RBX: 00007f271852dfa0 RCX: 00007f271839fd39 RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 RBP: 00007f2718420766 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f271852dfa0 R15: 00007ffcf8f34568 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8705 Comm: syz.3.3067 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:asm_sysvec_irq_work+0x0/0x20 arch/x86/include/asm/idtentry.h:644 Code: 00 66 0f 1f 84 00 00 00 00 00 0f 01 ca 6a ff e8 d6 02 00 00 48 89 e7 e8 3e 0a ec ff e9 c9 03 00 00 66 0f 1f 84 00 00 00 00 00 <0f> 01 ca 6a ff e8 b6 02 00 00 48 89 e7 e8 be 05 ec ff e9 a9 03 00 RSP: 0018:ffffc900001705b8 EFLAGS: 00000086 RAX: 0000000000000000 RBX: ffff88810ce3e100 RCX: ffff888124ecbb40 RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc90000170738 R08: ffffffff84282d7d R09: ffff888122aa9280 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000170988 R13: dffffc0000000000 R14: ffffc90000170670 R15: ffffc90000170690 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fde28ac7038 CR3: 000000010c933000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ip6_pol_route_input+0x55/0x80 net/ipv6/route.c:2280 pol_lookup_func include/net/ip6_fib.h:594 [inline] fib6_rule_lookup+0x25a/0x620 net/ipv6/fib6_rules.c:115 ip6_route_input_lookup net/ipv6/route.c:2292 [inline] ip6_route_input+0x726/0xb00 net/ipv6/route.c:2461 ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline] ip6_rcv_finish+0x14f/0x350 net/ipv6/ip6_input.c:78 NF_HOOK include/linux/netfilter.h:299 [inline] ipv6_rcv+0xee/0x270 net/ipv6/ip6_input.c:301 __netif_receive_skb_one_core net/core/dev.c:5382 [inline] __netif_receive_skb+0x1c6/0x530 net/core/dev.c:5496 process_backlog+0x31c/0x650 net/core/dev.c:6403 napi_poll net/core/dev.c:6854 [inline] net_rx_action+0x516/0x10d0 net/core/dev.c:6924 __do_softirq+0x268/0x5bb kernel/softirq.c:309 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:405 [inline] __irq_exit_rcu+0x128/0x150 kernel/softirq.c:435 irq_exit_rcu+0x9/0x10 kernel/softirq.c:447 sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1094 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635 RIP: 0010:lru_cache_disabled+0x1/0x40 mm/swap.c:971 Code: d8 ff e8 f2 f2 ff ff 5d c3 55 48 89 e5 e8 87 45 d8 ff 31 ff e8 70 f4 ff ff 5d c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 55 <48> 89 e5 53 e8 66 45 d8 ff 48 c7 c7 80 97 0b 87 be 04 00 00 00 e8 RSP: 0018:ffffc90000b174d0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888124ecbb40 RDX: 0000000000000000 RSI: 00000000000001fe RDI: 000000000000010e RBP: ffffc90000b17710 R08: ffffffff81a0a16e R09: fffff940008ec42f R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: ffffea0004762140 R14: ffff888111f1c778 R15: 00007f03d7cef000 unmap_single_vma mm/memory.c:1551 [inline] unmap_vmas+0x37f/0x4f0 mm/memory.c:1583 exit_mmap+0x2f2/0x5c0 mm/mmap.c:3355 __mmput+0x95/0x2d0 kernel/fork.c:1153 mmput+0x59/0x170 kernel/fork.c:1176 exit_mm kernel/exit.c:537 [inline] do_exit+0xbda/0x2a50 kernel/exit.c:848 do_group_exit+0x141/0x310 kernel/exit.c:983 get_signal+0x10a0/0x1410 kernel/signal.c:2782 arch_do_signal_or_restart+0xbd/0x17c0 arch/x86/kernel/signal.c:805 handle_signal_work kernel/entry/common.c:145 [inline] exit_to_user_mode_loop+0x9b/0xd0 kernel/entry/common.c:169 exit_to_user_mode_prepare kernel/entry/common.c:199 [inline] syscall_exit_to_user_mode+0xa2/0x1a0 kernel/entry/common.c:274 do_syscall_64+0x40/0x70 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7f03d8755d39 Code: Unable to access opcode bytes at RIP 0x7f03d8755d0f. RSP: 002b:00007f03d79d70f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000000 RBX: 00007f03d88e3fa8 RCX: 00007f03d8755d39 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f03d88e3fac RBP: 00007f03d88e3fa0 R08: 00007ffdd37c80b0 R09: 00007f03d79d76c0 R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f03d88e3fac R13: 000000000000000b R14: 00007ffdd365b810 R15: 00007ffdd365b8f8