ISOFS: Unable to identify CD-ROM format. watchdog: BUG: soft lockup - CPU#0 stuck for 47s! [syz-executor.1:13838] Modules linked in: irq event stamp: 4632986 hardirqs last enabled at (4632985): [] asm_sysvec_irq_work+0x12/0x20 arch/x86/include/asm/idtentry.h:664 hardirqs last disabled at (4632986): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1097 softirqs last enabled at (380): [] invoke_softirq kernel/softirq.c:432 [inline] softirqs last enabled at (380): [] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:637 softirqs last disabled at (373): [] invoke_softirq kernel/softirq.c:432 [inline] softirqs last disabled at (373): [] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:637 CPU: 0 PID: 13838 Comm: syz-executor.1 Not tainted 5.16.0-rc6-next-20211224 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__rcu_read_unlock+0xc4/0x510 kernel/rcu/tree_plugin.h:427 Code: b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 93 01 00 00 8b 85 f8 03 00 00 85 c0 75 54 <65> 48 8b 1c 25 40 6f 02 00 48 8d bb f4 03 00 00 48 b8 00 00 00 00 RSP: 0018:ffff88804861f6e0 EFLAGS: 00000202 RAX: 0000000000000189 RBX: ffffffff8520bcc0 RCX: 1ffffffff0d41a7e RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000001 R09: ffffffff86a06817 R10: fffffbfff0d40d02 R11: 0000000000000001 R12: ffff88806ce38800 R13: ffff88804861fa00 R14: 0000000000000200 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000001 CR3: 0000000005026000 CR4: 0000000000350ef0 Call Trace: rcu_read_unlock+0xe/0x60 include/linux/rcupdate.h:726 zap_pte_range mm/memory.c:1358 [inline] zap_pmd_range mm/memory.c:1468 [inline] zap_pud_range mm/memory.c:1497 [inline] zap_p4d_range mm/memory.c:1518 [inline] unmap_page_range+0xd36/0x2380 mm/memory.c:1539 unmap_single_vma+0x198/0x310 mm/memory.c:1584 unmap_vmas+0x16b/0x2f0 mm/memory.c:1616 exit_mmap+0x1d0/0x630 mm/mmap.c:3179 __mmput kernel/fork.c:1116 [inline] mmput+0xc8/0x380 kernel/fork.c:1137 exit_mm kernel/exit.c:507 [inline] do_exit+0xa3c/0x2840 kernel/exit.c:780 do_group_exit+0x128/0x330 kernel/exit.c:932 get_signal+0x494/0x26e0 kernel/signal.c:2868 arch_do_signal_or_restart+0x2b0/0x1720 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x143/0x1c0 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:300 do_syscall_64+0x48/0x90 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f27679d4b19 Code: Unable to access opcode bytes at RIP 0x7f27679d4aef. RSP: 002b:00007f2764f4a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f2767ae7f68 RCX: 00007f27679d4b19 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f2767ae7f68 RBP: 00007f2767ae7f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2767ae7f6c R13: 00007ffc56ef1fef R14: 00007f2764f4a300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 13778 Comm: syz-executor.0 Not tainted 5.16.0-rc6-next-20211224 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline] RIP: 0010:smp_call_function_many_cond+0x41b/0xb30 kernel/smp.c:969 Code: 0a 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 f4 4c 89 f5 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 07 ae 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 ad 05 00 00 8b 43 08 31 RSP: 0018:ffff888030e37620 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff88806ce3ecc0 RCX: 0000000000000000 RDX: ffff8880375c3580 RSI: ffffffff813870e9 RDI: 0000000000000003 RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff8138710f R11: 0000000000000000 R12: ffffed100d9c7d99 R13: 0000000000000000 R14: ffff88806ce3ecc8 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f92385e6030 CR3: 0000000005026000 CR4: 0000000000350ee0 Call Trace: on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1135 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1112 [inline] text_poke_bp_batch+0x1bb/0x510 arch/x86/kernel/alternative.c:1300 text_poke_flush arch/x86/kernel/alternative.c:1470 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1477 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 jump_label_update+0x1da/0x400 kernel/jump_label.c:830 static_key_disable_cpuslocked+0x152/0x1b0 kernel/jump_label.c:207 static_key_disable+0x16/0x20 kernel/jump_label.c:215 tracepoint_remove_func kernel/tracepoint.c:417 [inline] tracepoint_probe_unregister+0x638/0xc40 kernel/tracepoint.c:551 trace_event_reg+0x181/0x350 kernel/trace/trace_events.c:517 perf_trace_event_unreg.isra.0+0xb0/0x270 kernel/trace/trace_event_perf.c:162 perf_trace_destroy+0xba/0x100 kernel/trace/trace_event_perf.c:243 _free_event+0x159/0xcf0 kernel/events/core.c:4986 put_event kernel/events/core.c:5080 [inline] perf_event_release_kernel+0x5fd/0x7f0 kernel/events/core.c:5195 perf_release+0x33/0x40 kernel/events/core.c:5205 __fput+0x281/0x9e0 fs/file_table.c:311 task_work_run+0xe2/0x1a0 kernel/task_work.c:164 exit_task_work include/linux/task_work.h:32 [inline] do_exit+0xb0d/0x2840 kernel/exit.c:793 do_group_exit+0x128/0x330 kernel/exit.c:932 get_signal+0x494/0x26e0 kernel/signal.c:2868 arch_do_signal_or_restart+0x2b0/0x1720 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x143/0x1c0 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:300 do_syscall_64+0x48/0x90 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f588f17db19 Code: Unable to access opcode bytes at RIP 0x7f588f17daef. RSP: 002b:00007f588c6f3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f588f290f68 RCX: 00007f588f17db19 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f588f290f68 RBP: 00007f588f290f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f588f290f6c R13: 00007ffde54ab6cf R14: 00007f588c6f3300 R15: 0000000000022000 ---------------- Code disassembly (best guess): 0: b8 00 00 00 00 mov $0x0,%eax 5: 00 fc add %bh,%ah 7: ff (bad) 8: df 48 89 fisttps -0x77(%rax) b: fa cli c: 48 c1 ea 03 shr $0x3,%rdx 10: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax 14: 84 c0 test %al,%al 16: 74 08 je 0x20 18: 3c 03 cmp $0x3,%al 1a: 0f 8e 93 01 00 00 jle 0x1b3 20: 8b 85 f8 03 00 00 mov 0x3f8(%rbp),%eax 26: 85 c0 test %eax,%eax 28: 75 54 jne 0x7e * 2a: 65 48 8b 1c 25 40 6f mov %gs:0x26f40,%rbx <-- trapping instruction 31: 02 00 33: 48 8d bb f4 03 00 00 lea 0x3f4(%rbx),%rdi 3a: 48 rex.W 3b: b8 00 00 00 00 mov $0x0,%eax