watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz.2.83:6276] Modules linked in: irq event stamp: 11999389 hardirqs last enabled at (11999388): [] irqentry_exit+0x74/0x90 kernel/entry/common.c:310 hardirqs last disabled at (11999389): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1050 softirqs last enabled at (6692098): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (6692098): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (6692098): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (6692101): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (6692101): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (6692101): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 CPU: 1 UID: 0 PID: 6276 Comm: syz.2.83 Not tainted 6.16.0-rc4-syzkaller-gbf4807c89d8f #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:lock_acquire+0x175/0x360 kernel/locking/lockdep.c:5875 Code: 00 00 00 00 9c 8f 44 24 30 f7 44 24 30 00 02 00 00 0f 85 cd 00 00 00 f7 44 24 08 00 02 00 00 74 01 fb 65 48 8b 05 0b dd 01 11 <48> 3b 44 24 58 0f 85 f2 00 00 00 48 83 c4 60 5b 41 5c 41 5d 41 5e RSP: 0018:ffffc90000a07b58 EFLAGS: 00000206 RAX: 65bbe73006ba4400 RBX: 0000000000000000 RCX: 65bbe73006ba4400 RDX: 0000000000000000 RSI: ffffffff8db84369 RDI: ffffffff8be28f40 RBP: ffffffff81729af5 R08: 0000000000000000 R09: ffffffff81729af5 R10: dffffc0000000000 R11: fffff91ffffb3405 R12: 0000000000000002 R13: ffffffff8e13ee20 R14: 0000000000000000 R15: 0000000000000246 FS: 00007ff9f2e5c6c0(0000) GS:ffff888125d1f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c2f66a9 CR3: 00000000751f6000 CR4: 00000000003526f0 Call Trace: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:841 [inline] class_rcu_constructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0xc2/0x2390 arch/x86/kernel/unwind_orc.c:479 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kfree+0x18e/0x440 mm/slub.c:4842 ieee80211_inform_bss+0xbd9/0x10a0 net/mac80211/scan.c:160 rdev_inform_bss net/wireless/rdev-ops.h:418 [inline] cfg80211_inform_single_bss_data+0xd05/0x1ac0 net/wireless/scan.c:2367 cfg80211_inform_bss_data+0x1fb/0x3b20 net/wireless/scan.c:3222 cfg80211_inform_bss_frame_data+0x3d7/0x730 net/wireless/scan.c:3313 ieee80211_bss_info_update+0x746/0x9e0 net/mac80211/scan.c:226 ieee80211_scan_rx+0x593/0xa20 net/mac80211/scan.c:355 __ieee80211_rx_handle_packet net/mac80211/rx.c:5183 [inline] ieee80211_rx_list+0x22fc/0x2d80 net/mac80211/rx.c:5420 ieee80211_rx_napi+0x1a8/0x3d0 net/mac80211/rx.c:5443 ieee80211_rx include/net/mac80211.h:5185 [inline] ieee80211_handle_queued_frames+0xe8/0x1f0 net/mac80211/main.c:441 tasklet_action_common+0x369/0x580 kernel/softirq.c:829 handle_softirqs+0x286/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:rcu_lockdep_current_cpu_online+0xe8/0x120 kernel/rcu/tree.c:-1 Code: 00 74 08 48 89 df e8 57 76 7c 00 4c 85 3b 75 1a 48 c7 c7 c0 4a 14 8e be 04 00 00 00 e8 b1 78 7c 00 83 3d ca df 6c 0c 00 74 16 01 65 ff 0d 2f a5 f8 10 74 0f 5b 41 5e 41 5f e9 93 97 ca 09 cc RSP: 0018:ffffc9001a45ee10 EFLAGS: 00000202 RAX: 1ffffffff1c28846 RBX: ffffffff8e144230 RCX: 65bbe73006ba4400 RDX: ffff888026c0bc00 RSI: ffffffff8be28f20 RDI: ffff8880b873afa8 RBP: ffffc9001a45ef38 R08: ffffc9001a45eecf R09: 0000000000000000 R10: ffffc9001a45eec0 R11: fffff5200348bdda R12: 0000000000000001 R13: ffffc9001a45eec0 R14: dffffc0000000000 R15: 0000000000000002 rcu_read_lock_held_common kernel/rcu/update.c:113 [inline] rcu_read_lock_held+0x1e/0x50 kernel/rcu/update.c:349 bpf_prog_run_array include/linux/bpf.h:2223 [inline] trace_call_bpf+0x1f4/0x850 kernel/trace/bpf_trace.c:146 perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10891 do_perf_trace_lock_acquire include/trace/events/lock.h:24 [inline] perf_trace_lock_acquire+0x335/0x410 include/trace/events/lock.h:24 __do_trace_lock_acquire include/trace/events/lock.h:24 [inline] trace_lock_acquire include/trace/events/lock.h:24 [inline] lock_acquire+0x311/0x360 kernel/locking/lockdep.c:5834 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:841 [inline] class_rcu_constructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0xc2/0x2390 arch/x86/kernel/unwind_orc.c:479 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kfree+0x18e/0x440 mm/slub.c:4842 free_slab_obj_exts mm/slub.c:2047 [inline] unaccount_slab mm/slub.c:2592 [inline] __free_slab+0xb9/0x1c0 mm/slub.c:2687 discard_slab mm/slub.c:2717 [inline] __put_partials+0x161/0x1c0 mm/slub.c:3186 put_cpu_partial+0x17c/0x250 mm/slub.c:3261 __slab_free+0x2f7/0x400 mm/slub.c:4513 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4148 [inline] slab_alloc_node mm/slub.c:4197 [inline] __kmalloc_cache_node_noprof+0x1c0/0x3d0 mm/slub.c:4367 kmalloc_node_noprof include/linux/slab.h:928 [inline] __get_vm_area_node+0x13f/0x300 mm/vmalloc.c:3168 __vmalloc_node_range_noprof+0x301/0x12f0 mm/vmalloc.c:3845 __vmalloc_node_noprof mm/vmalloc.c:3948 [inline] __vmalloc_noprof+0xb1/0xf0 mm/vmalloc.c:3962 bpf_prog_alloc_no_stats+0x4a/0x4e0 kernel/bpf/core.c:104 bpf_prog_alloc+0x3c/0x1a0 kernel/bpf/core.c:146 bpf_prog_load+0x735/0x1930 kernel/bpf/syscall.c:2882 __sys_bpf+0x5f1/0x860 kernel/bpf/syscall.c:5836 __do_sys_bpf kernel/bpf/syscall.c:5943 [inline] __se_sys_bpf kernel/bpf/syscall.c:5941 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5941 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff9f1f8e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff9f2e5c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007ff9f21b5fa0 RCX: 00007ff9f1f8e929 RDX: 0000000000000094 RSI: 0000200000000880 RDI: 0000000000000005 RBP: 00007ff9f2010b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ff9f21b5fa0 R15: 00007ffe763b0728 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 3416 Comm: kworker/R-bat_e Not tainted 6.16.0-rc4-syzkaller-gbf4807c89d8f #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: bat_events batadv_nc_worker RIP: 0010:trace_softirq_entry include/trace/events/irq.h:128 [inline] RIP: 0010:handle_softirqs+0x24c/0x870 kernel/softirq.c:578 Code: 00 00 00 41 89 c4 c1 e8 06 48 8d 3c c5 f0 d6 a1 8f be 08 00 00 00 e8 63 3d 9e 00 4c 0f a3 25 ab 30 1c 0e 73 16 e8 04 7d 21 00 <84> c0 75 0d 80 3d b8 14 06 0e 00 0f 84 76 01 00 00 4d 89 fc 49 c1 RSP: 0018:ffffc90000007ee0 EFLAGS: 00000202 RAX: 0000000000000001 RBX: 0000000080000101 RCX: 8aedac8bfcfd1300 RDX: 0000000000000000 RSI: ffffffff8be28f20 RDI: ffffffff8be28ee0 RBP: ffffc90000007fe8 R08: ffffffff8fa1d6f7 R09: 1ffffffff1f43ade R10: dffffc0000000000 R11: fffffbfff1f43adf R12: 0000000000000000 R13: 0000000000000007 R14: 0000000000000006 R15: ffffffff8de0c0f0 FS: 0000000000000000(0000) GS:ffff888125c1f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffdbd484d3c CR3: 00000000766c2000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: do_softirq+0xec/0x180 kernel/softirq.c:480 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:407 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x318/0x3b0 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x369/0x610 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321 rescuer_thread+0x53c/0xdd0 kernel/workqueue.c:3498 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245