watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz.3.15:5431] Modules linked in: irq event stamp: 11061165 hardirqs last enabled at (11061164): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (11061165): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1037 softirqs last enabled at (4944): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last enabled at (4944): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last enabled at (4944): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 softirqs last disabled at (5209): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (5209): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (5209): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 CPU: 1 UID: 0 PID: 5431 Comm: syz.3.15 Not tainted 6.12.0-rc1-syzkaller-00153-ga5da3d65681f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:should_resched arch/x86/include/asm/preempt.h:103 [inline] RIP: 0010:__local_bh_enable_ip+0x170/0x200 kernel/softirq.c:389 Code: 8c e8 74 f0 6d 0a 65 66 8b 05 e4 52 ac 7e 66 85 c0 75 5d bf 01 00 00 00 e8 bd ae 0b 00 e8 58 22 45 00 fb 65 8b 05 a8 52 ac 7e <85> c0 75 05 e8 47 31 a9 ff 48 c7 44 24 20 0e 36 e0 45 49 c7 04 1c RSP: 0018:ffffc90000a18600 EFLAGS: 00000286 RAX: 0000000000000101 RBX: 1ffff920001430c4 RCX: ffffffff8170c42a RDX: dffffc0000000000 RSI: ffffffff8c0acac0 RDI: ffffffff8c60fbe0 RBP: ffffc90000a186b0 R08: ffffffff942c58ff R09: 1ffffffff2858b1f R10: dffffc0000000000 R11: fffffbfff2858b20 R12: dffffc0000000000 R13: 1ffff920001430c8 R14: ffffc90000a18640 R15: 0000000000000200 FS: 00007ff38310f6c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c32ff02 CR3: 0000000079890000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: local_bh_enable include/linux/bottom_half.h:33 [inline] ip6t_do_table+0x1687/0x18a0 net/ipv6/netfilter/ip6_tables.c:375 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK include/linux/netfilter.h:312 [inline] ndisc_send_skb+0x122f/0x1380 net/ipv6/ndisc.c:511 addrconf_rs_timer+0x371/0x670 net/ipv6/addrconf.c:4042 call_timer_fn+0x18e/0x650 kernel/time/timer.c:1794 expire_timers kernel/time/timer.c:1845 [inline] __run_timers kernel/time/timer.c:2419 [inline] __run_timer_base+0x66a/0x8e0 kernel/time/timer.c:2430 run_timer_base kernel/time/timer.c:2439 [inline] run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2449 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1037 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1037 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__schedule+0x108/0x4b30 kernel/sched/core.c:6548 Code: 89 df e8 3b 6e 31 f6 4c 8b 33 49 8d 9e 80 f5 03 00 48 89 d9 48 c1 e9 03 48 b8 00 00 00 00 00 fc ff df 48 89 8c 24 a0 00 00 00 <80> 3c 01 00 74 08 48 89 df e8 0a 6e 31 f6 48 89 5c 24 70 48 8b 03 RSP: 0018:ffffc90004b9f5c0 EFLAGS: 00000a02 RAX: dffffc0000000000 RBX: ffff8880b873f580 RCX: 1ffff110170e7eb0 RDX: 0000000000000000 RSI: ffffffff8c60fbc0 RDI: ffffffff8c60fb80 RBP: ffffc90004b9f7b0 R08: ffffc90004b9f73f R09: 0000000000000000 R10: ffffc90004b9f730 R11: fffff52000973ee8 R12: ffffc90004b9f730 R13: ffffffff931b8a4a R14: ffff8880b8700000 R15: dffffc0000000000 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6854 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6878 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 on_each_cpu_cond_mask+0x79/0x80 kernel/smp.c:1052 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2085 [inline] text_poke_bp_batch+0x726/0xb30 arch/x86/kernel/alternative.c:2357 text_poke_flush arch/x86/kernel/alternative.c:2486 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2493 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_disable_cpuslocked+0xd2/0x1c0 kernel/jump_label.c:240 static_key_disable+0x1a/0x20 kernel/jump_label.c:248 tracepoint_remove_func kernel/tracepoint.c:417 [inline] tracepoint_probe_unregister+0x6f2/0x990 kernel/tracepoint.c:551 trace_event_reg+0x154/0x270 perf_trace_event_unreg+0xb4/0x1b0 kernel/trace/trace_event_perf.c:162 perf_trace_destroy+0xa2/0x140 kernel/trace/trace_event_perf.c:241 perf_try_init_event+0x671/0x810 kernel/events/core.c:11922 perf_init_event kernel/events/core.c:11977 [inline] perf_event_alloc+0x135f/0x2310 kernel/events/core.c:12259 __do_sys_perf_event_open kernel/events/core.c:12766 [inline] __se_sys_perf_event_open+0xb1f/0x3870 kernel/events/core.c:12657 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff38237dff9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff38310f038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007ff382535f80 RCX: 00007ff38237dff9 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000040 RBP: 00007ff3823f0296 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ff382535f80 R15: 00007fff3facc538 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 5424 Comm: syz.2.13 Not tainted 6.12.0-rc1-syzkaller-00153-ga5da3d65681f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:trace_lock_release include/trace/events/lock.h:69 [inline] RIP: 0010:lock_release+0x85/0xa30 kernel/locking/lockdep.c:5836 Code: 8d 64 24 60 49 c1 ec 03 48 b8 f1 f1 f1 f1 04 f2 00 f2 4b 89 04 3c 48 b8 f2 f2 00 f3 f3 f3 f3 f3 4b 89 44 3c 08 cc 1f 44 00 00 <65> 8b 05 70 64 93 7e 83 f8 08 0f 83 fe 05 00 00 89 c3 48 89 d8 48 RSP: 0018:ffffc90004507140 EFLAGS: 00000a02 RAX: f3f3f3f3f300f2f2 RBX: 0000000000000001 RCX: ffff88802d7ada00 RDX: 0000000000000000 RSI: ffffffff820b8556 RDI: ffffffff8e937d60 RBP: ffffc90004507278 R08: ffffffff820b87d2 R09: 1ffffffff2858b00 R10: dffffc0000000000 R11: fffffbfff2858b01 R12: 1ffff920008a0e34 R13: ffffffff820b8556 R14: ffffffff820b8556 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b5aeb937f0 CR3: 00000000636f8000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_lock_release include/linux/rcupdate.h:347 [inline] rcu_read_unlock_sched include/linux/rcupdate.h:962 [inline] pfn_valid+0x3eb/0x450 include/linux/mmzone.h:2053 page_table_check_clear+0x1e/0x550 mm/page_table_check.c:70 get_and_clear_full_ptes include/linux/pgtable.h:684 [inline] zap_present_folio_ptes mm/memory.c:1496 [inline] zap_present_ptes mm/memory.c:1579 [inline] zap_pte_range mm/memory.c:1621 [inline] zap_pmd_range mm/memory.c:1739 [inline] zap_pud_range mm/memory.c:1768 [inline] zap_p4d_range mm/memory.c:1789 [inline] unmap_page_range+0x2a13/0x40e0 mm/memory.c:1810 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1900 exit_mmap+0x275/0xc40 mm/mmap.c:1864 __mmput+0x115/0x390 kernel/fork.c:1347 exit_mm+0x220/0x310 kernel/exit.c:571 do_exit+0x9b2/0x28e0 kernel/exit.c:926 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 get_signal+0x16a3/0x1740 kernel/signal.c:2917 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f5a99f7dff9 Code: Unable to access opcode bytes at 0x7f5a99f7dfcf. RSP: 002b:00007f5a9adcb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: fffffffffffffff5 RBX: 00007f5a9a135f80 RCX: 00007f5a99f7dff9 RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 RBP: 00007f5a99ff0296 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f5a9a135f80 R15: 00007ffe46c5e4a8