watchdog: BUG: soft lockup - CPU#0 stuck for 128s! [syz.1.3063:8695]
Modules linked in:
CPU: 0 PID: 8695 Comm: syz.1.3063 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:slab_alloc_node mm/slub.c:2889 [inline]
RIP: 0010:slab_alloc mm/slub.c:2955 [inline]
RIP: 0010:__kmalloc_track_caller+0xf6/0x320 mm/slub.c:4536
Code: 00 65 48 ff 08 e8 3a f0 af ff e9 af 00 00 00 4d 85 ed 0f 84 a6 00 00 00 4c 8b 65 c0 0f 1f 44 00 00 49 8b 45 00 65 48 8b 50 08 <49> 8b 45 00 65 48 03 05 5e 48 5a 7e 48 3b 50 08 75 e5 48 8b 38 48
RSP: 0018:ffffc90000007b20 EFLAGS: 00000282
RAX: 0000000000059b20 RBX: 0000000000082a20 RCX: 0000000000000000
RDX: 000000000007d368 RSI: 0000000000000200 RDI: ffffffff8683aca0
RBP: ffffc90000007b70 R08: 0000000000000140 R09: ffff888133408780
R10: 0000000000000000 R11: 00000000e45572db R12: ffffffff842c8693
R13: ffff888100043080 R14: 0000000000082a20 R15: 0000000000000200
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f58be22cd60 CR3: 0000000132b22000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
__kmalloc_reserve net/core/skbuff.c:143 [inline]
__alloc_skb+0xbc/0x510 net/core/skbuff.c:211
alloc_skb include/linux/skbuff.h:1126 [inline]
ndisc_alloc_skb+0xf3/0x2d0 net/ipv6/ndisc.c:421
ndisc_send_rs+0x26c/0x6a0 net/ipv6/ndisc.c:687
addrconf_rs_timer+0x2d1/0x600 net/ipv6/addrconf.c:3962
call_timer_fn+0x3b/0x2d0 kernel/time/timer.c:1450
expire_timers kernel/time/timer.c:1495 [inline]
__run_timers+0x72a/0xa10 kernel/time/timer.c:1789
run_timer_softirq+0x69/0xf0 kernel/time/timer.c:1802
__do_softirq+0x268/0x5bb kernel/softirq.c:309
asm_call_irq_on_stack+0xf/0x20
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
invoke_softirq kernel/softirq.c:405 [inline]
__irq_exit_rcu+0x128/0x150 kernel/softirq.c:435
irq_exit_rcu+0x9/0x10 kernel/softirq.c:447
sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1094
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:__tlb_remove_page_size+0x6a/0x300 mm/mmu_gather.c:81
Code: 0c a0 07 00 48 89 5d c8 4c 89 75 c0 49 8b 1e 48 8d 7b 08 48 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 f0 01 00 00 8b 43 08 <44> 8d 68 01 44 89 6b 08 4c 8d 74 c3 10 4c 89 f0 48 c1 e8 03 42 80
RSP: 0018:ffffc90000dcf490 EFLAGS: 00000246
RAX: 0000000000000077 RBX: ffff8881238bd000 RCX: ffff88810d6762c0
RDX: 0000000000000000 RSI: ffffea00042e5340 RDI: ffff8881238bd008
RBP: ffffc90000dcf4d0 R08: ffffffff819d7162 R09: fffff9400085ca6f
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffffea00042e5340 R14: ffffc90000dcf8c8 R15: ffffea00042e5340
__tlb_remove_page include/asm-generic/tlb.h:442 [inline]
zap_pte_range mm/memory.c:1319 [inline]
zap_pmd_range mm/memory.c:1435 [inline]
zap_pud_range mm/memory.c:1464 [inline]
zap_p4d_range mm/memory.c:1485 [inline]
unmap_page_range+0x121b/0x23b0 mm/memory.c:1506
unmap_single_vma mm/memory.c:1551 [inline]
unmap_vmas+0x37f/0x4f0 mm/memory.c:1583
exit_mmap+0x2f2/0x5c0 mm/mmap.c:3355
__mmput+0x95/0x2d0 kernel/fork.c:1153
mmput+0x59/0x170 kernel/fork.c:1176
exit_mm kernel/exit.c:537 [inline]
do_exit+0xbda/0x2a50 kernel/exit.c:848
do_group_exit+0x141/0x310 kernel/exit.c:983
get_signal+0x10a0/0x1410 kernel/signal.c:2782
arch_do_signal_or_restart+0xbd/0x17c0 arch/x86/kernel/signal.c:805
handle_signal_work kernel/entry/common.c:145 [inline]
exit_to_user_mode_loop+0x9b/0xd0 kernel/entry/common.c:169
exit_to_user_mode_prepare kernel/entry/common.c:199 [inline]
syscall_exit_to_user_mode+0xa2/0x1a0 kernel/entry/common.c:274
do_syscall_64+0x40/0x70 arch/x86/entry/common.c:56
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7f271839fd39
Code: Unable to access opcode bytes at RIP 0x7f271839fd0f.
RSP: 002b:00007f2717621048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: fffffffffffffff5 RBX: 00007f271852dfa0 RCX: 00007f271839fd39
RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005
RBP: 00007f2718420766 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f271852dfa0 R15: 00007ffcf8f34568
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 8705 Comm: syz.3.3067 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:asm_sysvec_irq_work+0x0/0x20 arch/x86/include/asm/idtentry.h:644
Code: 00 66 0f 1f 84 00 00 00 00 00 0f 01 ca 6a ff e8 d6 02 00 00 48 89 e7 e8 3e 0a ec ff e9 c9 03 00 00 66 0f 1f 84 00 00 00 00 00 <0f> 01 ca 6a ff e8 b6 02 00 00 48 89 e7 e8 be 05 ec ff e9 a9 03 00
RSP: 0018:ffffc900001705b8 EFLAGS: 00000086
RAX: 0000000000000000 RBX: ffff88810ce3e100 RCX: ffff888124ecbb40
RDX: 0000000000000101 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000170738 R08: ffffffff84282d7d R09: ffff888122aa9280
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000170988
R13: dffffc0000000000 R14: ffffc90000170670 R15: ffffc90000170690
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fde28ac7038 CR3: 000000010c933000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ip6_pol_route_input+0x55/0x80 net/ipv6/route.c:2280
pol_lookup_func include/net/ip6_fib.h:594 [inline]
fib6_rule_lookup+0x25a/0x620 net/ipv6/fib6_rules.c:115
ip6_route_input_lookup net/ipv6/route.c:2292 [inline]
ip6_route_input+0x726/0xb00 net/ipv6/route.c:2461
ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline]
ip6_rcv_finish+0x14f/0x350 net/ipv6/ip6_input.c:78
NF_HOOK include/linux/netfilter.h:299 [inline]
ipv6_rcv+0xee/0x270 net/ipv6/ip6_input.c:301
__netif_receive_skb_one_core net/core/dev.c:5382 [inline]
__netif_receive_skb+0x1c6/0x530 net/core/dev.c:5496
process_backlog+0x31c/0x650 net/core/dev.c:6403
napi_poll net/core/dev.c:6854 [inline]
net_rx_action+0x516/0x10d0 net/core/dev.c:6924
__do_softirq+0x268/0x5bb kernel/softirq.c:309
asm_call_irq_on_stack+0xf/0x20
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
invoke_softirq kernel/softirq.c:405 [inline]
__irq_exit_rcu+0x128/0x150 kernel/softirq.c:435
irq_exit_rcu+0x9/0x10 kernel/softirq.c:447
sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1094
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:lru_cache_disabled+0x1/0x40 mm/swap.c:971
Code: d8 ff e8 f2 f2 ff ff 5d c3 55 48 89 e5 e8 87 45 d8 ff 31 ff e8 70 f4 ff ff 5d c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 55 <48> 89 e5 53 e8 66 45 d8 ff 48 c7 c7 80 97 0b 87 be 04 00 00 00 e8
RSP: 0018:ffffc90000b174d0 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888124ecbb40
RDX: 0000000000000000 RSI: 00000000000001fe RDI: 000000000000010e
RBP: ffffc90000b17710 R08: ffffffff81a0a16e R09: fffff940008ec42f
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffffea0004762140 R14: ffff888111f1c778 R15: 00007f03d7cef000
unmap_single_vma mm/memory.c:1551 [inline]
unmap_vmas+0x37f/0x4f0 mm/memory.c:1583
exit_mmap+0x2f2/0x5c0 mm/mmap.c:3355
__mmput+0x95/0x2d0 kernel/fork.c:1153
mmput+0x59/0x170 kernel/fork.c:1176
exit_mm kernel/exit.c:537 [inline]
do_exit+0xbda/0x2a50 kernel/exit.c:848
do_group_exit+0x141/0x310 kernel/exit.c:983
get_signal+0x10a0/0x1410 kernel/signal.c:2782
arch_do_signal_or_restart+0xbd/0x17c0 arch/x86/kernel/signal.c:805
handle_signal_work kernel/entry/common.c:145 [inline]
exit_to_user_mode_loop+0x9b/0xd0 kernel/entry/common.c:169
exit_to_user_mode_prepare kernel/entry/common.c:199 [inline]
syscall_exit_to_user_mode+0xa2/0x1a0 kernel/entry/common.c:274
do_syscall_64+0x40/0x70 arch/x86/entry/common.c:56
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7f03d8755d39
Code: Unable to access opcode bytes at RIP 0x7f03d8755d0f.
RSP: 002b:00007f03d79d70f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000000 RBX: 00007f03d88e3fa8 RCX: 00007f03d8755d39
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f03d88e3fac
RBP: 00007f03d88e3fa0 R08: 00007ffdd37c80b0 R09: 00007f03d79d76c0
R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f03d88e3fac
R13: 000000000000000b R14: 00007ffdd365b810 R15: 00007ffdd365b8f8