watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.5:10039]
Modules linked in:
irq event stamp: 4286321
hardirqs last  enabled at (4286320): [<ffffffff87400976>] restore_regs_and_return_to_kernel+0x0/0x2a
hardirqs last disabled at (4286321): [<ffffffff874018ae>] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793
softirqs last  enabled at (82078): [<ffffffff8760068b>] __do_softirq+0x68b/0x9ff kernel/softirq.c:314
softirqs last disabled at (91225): [<ffffffff81321d13>] invoke_softirq kernel/softirq.c:368 [inline]
softirqs last disabled at (91225): [<ffffffff81321d13>] irq_exit+0x193/0x240 kernel/softirq.c:409
CPU: 0 PID: 10039 Comm: syz-executor.5 Not tainted 4.14.268-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880925ae200 task.stack: ffff88809fa00000
RIP: 0010:nf_hook_slow+0x33/0x1a0 net/netfilter/core.c:466
RSP: 0018:ffff8880ba4079f8 EFLAGS: 00000a02 ORIG_RAX: ffffffffffffff10
RAX: 0000000000000000 RBX: ffff888098bfecc0 RCX: 0000000000000000
RDX: 1ffff1101317fd98 RSI: ffff8880ba407a80 RDI: ffff8880a9dcb440
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000022012
R10: ffff8880925aeb28 R11: ffff8880925ae200 R12: ffff8880a9dcb440
R13: ffff8880ba407a80 R14: ffff888098bfecc0 R15: ffff888056064040
FS:  00007f43251f2700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4ad6b90ce0 CR3: 0000000096d8d000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 nf_hook include/linux/netfilter.h:205 [inline]
 NF_HOOK_COND include/linux/netfilter.h:238 [inline]
 ip6_output+0x392/0x660 net/ipv6/ip6_output.c:209
 dst_output include/net/dst.h:470 [inline]
 NF_HOOK include/linux/netfilter.h:250 [inline]
 ndisc_send_skb+0x82a/0x1390 net/ipv6/ndisc.c:483
 ndisc_send_rs+0x125/0x630 net/ipv6/ndisc.c:677
 addrconf_rs_timer+0x2bb/0x5a0 net/ipv6/addrconf.c:3769
 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1280
 expire_timers+0x232/0x4d0 kernel/time/timer.c:1319
 __run_timers kernel/time/timer.c:1637 [inline]
 run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1650
 __do_softirq+0x24d/0x9ff kernel/softirq.c:288
 invoke_softirq kernel/softirq.c:368 [inline]
 irq_exit+0x193/0x240 kernel/softirq.c:409
 exiting_irq arch/x86/include/asm/apic.h:638 [inline]
 smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106
 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793
 </IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:779 [inline]
RIP: 0010:lock_acquire+0x1ec/0x3f0 kernel/locking/lockdep.c:4001
RSP: 0018:ffff88809fa076c0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff10
RAX: 1ffffffff11e1279 RBX: ffff8880925ae200 RCX: 3ce90d0ccd849272
RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000286
RBP: ffffffff88f77980 R08: 0000000000000000 R09: 0000000000020012
R10: ffff8880925aeab0 R11: ffff8880925ae200 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000
 rcu_lock_acquire include/linux/rcupdate.h:242 [inline]
 rcu_read_lock include/linux/rcupdate.h:629 [inline]
 lock_page_memcg+0x36/0x200 mm/memcontrol.c:1640
 page_remove_file_rmap+0x2d/0x690 mm/rmap.c:1208
 page_remove_rmap+0x96/0xe0 mm/rmap.c:1293
 zap_pte_range mm/memory.c:1364 [inline]
 zap_pmd_range mm/memory.c:1466 [inline]
 zap_pud_range mm/memory.c:1495 [inline]
 zap_p4d_range mm/memory.c:1516 [inline]
 unmap_page_range+0xf3f/0x1ce0 mm/memory.c:1537
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1582
 unmap_vmas+0x9d/0x160 mm/memory.c:1612
 exit_mmap+0x270/0x4d0 mm/mmap.c:3058
 __mmput kernel/fork.c:931 [inline]
 mmput kernel/fork.c:952 [inline]
 mmput+0xfa/0x420 kernel/fork.c:947
 exit_mm kernel/exit.c:548 [inline]
 do_exit+0x984/0x2850 kernel/exit.c:855
 do_group_exit+0x100/0x2e0 kernel/exit.c:965
 get_signal+0x38d/0x1ca0 kernel/signal.c:2412
 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7f432687d049
RSP: 002b:00007f43251f2218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007f432698ff68 RCX: 00007f432687d049
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f432698ff68
RBP: 00007f432698ff60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f432698ff6c
R13: 00007ffdd9f3955f R14: 00007f43251f2300 R15: 0000000000022000
Code: f5 41 54 49 89 fc 55 89 cd 53 48 89 d3 48 83 ec 10 e8 a2 59 71 fb 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 04 02 <84> c0 74 08 3c 01 0f 8e 15 01 00 00 0f b7 03 39 c5 0f 83 d5 00 
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 8014 Comm: syz-executor.2 Not tainted 4.14.268-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88809dcc43c0 task.stack: ffff88809a4c0000
RIP: 0010:__read_once_size include/linux/compiler.h:185 [inline]
RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline]
RIP: 0010:smp_call_function_single+0x181/0x370 kernel/smp.c:302
RSP: 0018:ffff88809a4c7a60 EFLAGS: 00000297
RAX: ffff88809dcc43c0 RBX: 1ffff11013498f50 RCX: 1ffff11013b98992
RDX: 0000000000000000 RSI: ffff88809dcc4c70 RDI: 0000000000000286
RBP: ffff88809a4c7b08 R08: ffff88809dcc43c0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88809a4c7bc0 R14: 0000000000000001 R15: 0000000000000001
FS:  00005555561ea400(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555567a1708 CR3: 0000000096d8d000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 smp_call_function_many+0x60f/0x7a0 kernel/smp.c:434
 flush_tlb_others arch/x86/include/asm/paravirt.h:309 [inline]
 flush_tlb_mm_range+0x158/0x2f0 arch/x86/mm/tlb.c:709
 dup_mmap kernel/fork.c:721 [inline]
 dup_mm kernel/fork.c:1200 [inline]
 copy_mm kernel/fork.c:1255 [inline]
 copy_process.part.0+0x5fd9/0x71c0 kernel/fork.c:1791
 copy_process kernel/fork.c:1606 [inline]
 _do_fork+0x184/0xc80 kernel/fork.c:2092
 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7fdb1ea4863b
RSP: 002b:00007ffe3e63c8d0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdb1ea4863b
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
RBP: 0000000000000001 R08: 0000000000000000 R09: 00005555561ea400
R10: 00005555561ea6d0 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe3e63c9b0
Code: c9 08 00 48 8b 54 24 10 4c 89 e9 8b 7c 24 1c 48 8d 74 24 40 e8 71 fa ff ff 41 89 c4 8b 44 24 58 a8 01 74 0f e8 51 c9 08 00 f3 90 <8b> 44 24 58 a8 01 75 f1 e8 42 c9 08 00 e8 3d c9 08 00 bf 01 00 
----------------
Code disassembly (best guess):
   0:	f5                   	cmc
   1:	41 54                	push   %r12
   3:	49 89 fc             	mov    %rdi,%r12
   6:	55                   	push   %rbp
   7:	89 cd                	mov    %ecx,%ebp
   9:	53                   	push   %rbx
   a:	48 89 d3             	mov    %rdx,%rbx
   d:	48 83 ec 10          	sub    $0x10,%rsp
  11:	e8 a2 59 71 fb       	callq  0xfb7159b8
  16:	48 89 da             	mov    %rbx,%rdx
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df
  23:	48 c1 ea 03          	shr    $0x3,%rdx
  27:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax
* 2b:	84 c0                	test   %al,%al <-- trapping instruction
  2d:	74 08                	je     0x37
  2f:	3c 01                	cmp    $0x1,%al
  31:	0f 8e 15 01 00 00    	jle    0x14c
  37:	0f b7 03             	movzwl (%rbx),%eax
  3a:	39 c5                	cmp    %eax,%ebp
  3c:	0f                   	.byte 0xf
  3d:	83 d5 00             	adc    $0x0,%ebp