watchdog: BUG: soft lockup - CPU#0 stuck for 144s! [syz.3.71:6142] Modules linked in: irq event stamp: 10766349 hardirqs last enabled at (10766348): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (10766349): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (8128554): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last enabled at (8128554): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last enabled at (8128554): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 softirqs last disabled at (8128557): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (8128557): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (8128557): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 CPU: 0 UID: 0 PID: 6142 Comm: syz.3.71 Not tainted 6.12.0-rc4-syzkaller-ge626a13f6fbb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:lock_release+0x911/0xa30 Code: ff ff 48 8d 8c 24 80 00 00 00 80 e1 07 80 c1 03 38 c1 0f 8c fb fa ff ff 48 8d bc 24 80 00 00 00 e8 f4 35 8e 00 e9 e9 fa ff ff 0f 1e fa 4d 89 ee 4c 89 64 24 10 65 8b 05 38 62 93 7e 83 f8 08 RSP: 0018:ffffc90000007ac0 EFLAGS: 00000a02 RAX: f3f3f3f3f300f2f2 RBX: 0000000000000001 RCX: ffff8880305a8000 RDX: 0000000000000100 RSI: ffffffff8b3c6bc6 RDI: ffffffff8e937e20 RBP: ffffc90000007bf0 R08: ffffffff8b3c6c8a R09: 1ffffffff2859500 R10: dffffc0000000000 R11: fffffbfff2859501 R12: 1ffff92000000f64 R13: ffffffff8b3c6bc6 R14: dffffc0000000000 R15: dffffc0000000000 FS: 00007ff2fce276c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c26e194 CR3: 0000000032d8e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_lock_release include/linux/rcupdate.h:347 [inline] rcu_read_unlock include/linux/rcupdate.h:880 [inline] ieee80211_rx_napi+0x213/0x3c0 net/mac80211/rx.c:5486 ieee80211_rx include/net/mac80211.h:5138 [inline] ieee80211_handle_queued_frames+0xe7/0x1e0 net/mac80211/main.c:439 tasklet_action_common+0x321/0x4d0 kernel/softirq.c:784 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:strlen+0x31/0x70 lib/string.c:402 Code: 56 41 54 53 49 89 fe 48 c7 c0 ff ff ff ff 49 bf 00 00 00 00 00 fc ff df 48 89 fb 49 89 c4 48 89 d8 48 c1 e8 03 42 0f b6 04 38 <84> c0 75 12 48 ff c3 49 8d 44 24 01 43 80 7c 26 01 00 75 dd eb 13 RSP: 0018:ffffc9000b707338 EFLAGS: 00000a02 RAX: 0000000000000000 RBX: ffffffff8c087a60 RCX: 000000000b707403 RDX: ffffffff81356aeb RSI: ffff88801ac7b078 RDI: ffffffff8c087a60 RBP: ffffc9000b707470 R08: ffffffff901cffef R09: 1ffffffff2039ffd R10: dffffc0000000000 R11: fffffbfff2039ffe R12: ffffffffffffffff R13: ffffffff81356aeb R14: ffffffff8c087a60 R15: dffffc0000000000 trace_event_get_offsets_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x10a/0x490 include/trace/events/lock.h:50 trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x9cc/0xa30 kernel/locking/lockdep.c:5836 __raw_spin_unlock include/linux/spinlock_api_smp.h:141 [inline] _raw_spin_unlock+0x16/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] __text_poke+0xa6b/0xd30 arch/x86/kernel/alternative.c:1960 text_poke arch/x86/kernel/alternative.c:1984 [inline] text_poke_bp_batch+0x59c/0xb30 arch/x86/kernel/alternative.c:2317 text_poke_flush arch/x86/kernel/alternative.c:2486 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2493 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x136/0x260 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 tracepoint_add_func+0x953/0x9e0 kernel/tracepoint.c:361 tracepoint_probe_register_prio kernel/tracepoint.c:511 [inline] tracepoint_probe_register+0x105/0x160 kernel/tracepoint.c:531 perf_trace_event_reg kernel/trace/trace_event_perf.c:129 [inline] perf_trace_event_init+0x478/0x930 kernel/trace/trace_event_perf.c:202 perf_trace_init+0x243/0x2e0 kernel/trace/trace_event_perf.c:226 perf_tp_event_init+0x8d/0x110 kernel/events/core.c:10357 perf_try_init_event+0x146/0x810 kernel/events/core.c:11891 perf_init_event kernel/events/core.c:11977 [inline] perf_event_alloc+0x135f/0x2310 kernel/events/core.c:12259 __do_sys_perf_event_open kernel/events/core.c:12766 [inline] __se_sys_perf_event_open+0xb1f/0x3870 kernel/events/core.c:12657 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff2fbf7e719 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff2fce27038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007ff2fc135f80 RCX: 00007ff2fbf7e719 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 RBP: 00007ff2fbff132e R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ff2fc135f80 R15: 00007ffd68394248 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 6144 Comm: syz.1.74 Not tainted 6.12.0-rc4-syzkaller-ge626a13f6fbb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:page_table_check_clear+0x1ec/0x550 mm/page_table_check.c:90 Code: 2b 31 ff 89 ee e8 74 55 89 ff 85 ed 0f 85 b3 01 00 00 48 8d 7b 04 be 04 00 00 00 e8 de 27 f3 ff bd ff ff ff ff f0 0f c1 6b 04 <8d> 75 ff 31 ff e8 4a 55 89 ff ff cd 0f 88 91 01 00 00 e8 fd 50 89 RSP: 0018:ffffc9000ba6f2c0 EFLAGS: 00000257 RAX: 0000000000000001 RBX: ffff88801e1f4818 RCX: ffffffff820b86a2 RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff88801e1f481c RBP: 0000000000000001 R08: ffff88801e1f481f R09: 1ffff11003c3e903 R10: dffffc0000000000 R11: ffffed1003c3e904 R12: 0000000000000000 R13: ffff88801e1f47d0 R14: 0000000000000000 R15: 1ffffffff34883bc FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2129c67d60 CR3: 0000000068c14000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: get_and_clear_full_ptes include/linux/pgtable.h:684 [inline] zap_present_folio_ptes mm/memory.c:1496 [inline] zap_present_ptes mm/memory.c:1579 [inline] zap_pte_range mm/memory.c:1621 [inline] zap_pmd_range mm/memory.c:1739 [inline] zap_pud_range mm/memory.c:1768 [inline] zap_p4d_range mm/memory.c:1789 [inline] unmap_page_range+0x2a13/0x40e0 mm/memory.c:1810 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1900 exit_mmap+0x275/0xc40 mm/mmap.c:1874 __mmput+0x115/0x390 kernel/fork.c:1347 exit_mm+0x220/0x310 kernel/exit.c:571 do_exit+0x9b2/0x28e0 kernel/exit.c:926 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 get_signal+0x16a3/0x1740 kernel/signal.c:2917 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0afe17e719 Code: Unable to access opcode bytes at 0x7f0afe17e6ef. RSP: 002b:00007f0afefe80e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000000 RBX: 00007f0afe335f88 RCX: 00007f0afe17e719 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f0afe335f88 RBP: 00007f0afe335f80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0afe335f8c R13: 0000000000000000 R14: 00007ffe2eff1e80 R15: 00007ffe2eff1f68