watchdog: BUG: soft lockup - CPU#0 stuck for 245s! [syz-executor.3:8664] Modules linked in: CPU: 0 PID: 8664 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00003-gdda68b1657b1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:unwind_next_frame+0x5b2/0x700 arch/x86/kernel/unwind_frame.c:370 Code: 00 00 00 00 fc ff df 41 0f b6 04 17 84 c0 0f 85 b6 00 00 00 41 c7 06 00 00 00 00 31 c0 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f <5d> c3 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 6d fa ff ff 4c 89 f7 RSP: 0018:ffffc90000007710 EFLAGS: 00000286 RAX: 0000000000007701 RBX: ffffc90000007720 RCX: 0000000000007701 RDX: 1ffff92000000ee6 RSI: ffffc90000e37af8 RDI: ffffc90000007778 RBP: ffffc90000007710 R08: ffffc90000007808 R09: 0000000000000019 R10: ffffc90000007810 R11: dffffc0000000001 R12: ffff88813628a880 R13: ffffffff816594e0 R14: ffffc90000007800 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000004 CR3: 0000000006e0f000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: arch_stack_walk+0x10d/0x140 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x113/0x1c0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_alloc_info+0x1f/0x30 mm/kasan/generic.c:505 ____kasan_kmalloc mm/kasan/common.c:379 [inline] __kasan_kmalloc+0x9c/0xb0 mm/kasan/common.c:388 kasan_kmalloc include/linux/kasan.h:212 [inline] __do_kmalloc_node mm/slab_common.c:957 [inline] __kmalloc_node_track_caller+0xb3/0x1e0 mm/slab_common.c:977 kmalloc_reserve net/core/skbuff.c:446 [inline] __alloc_skb+0x125/0x2d0 net/core/skbuff.c:515 alloc_skb include/linux/skbuff.h:1283 [inline] ndisc_alloc_skb+0xf3/0x2d0 net/ipv6/ndisc.c:422 ndisc_send_rs+0x264/0x5f0 net/ipv6/ndisc.c:703 addrconf_rs_timer+0x2d1/0x600 net/ipv6/addrconf.c:3968 call_timer_fn+0x3b/0x2d0 kernel/time/timer.c:1480 expire_timers kernel/time/timer.c:1525 [inline] __run_timers+0x72a/0xa10 kernel/time/timer.c:1796 run_timer_softirq+0x69/0xf0 kernel/time/timer.c:1809 __do_softirq+0x1d8/0x661 kernel/softirq.c:617 invoke_softirq kernel/softirq.c:472 [inline] __irq_exit_rcu+0x50/0xf0 kernel/softirq.c:700 irq_exit_rcu+0x9/0x10 kernel/softirq.c:712 sysvec_apic_timer_interrupt+0x9a/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:653 RIP: 0010:preempt_schedule_irq+0xc2/0x140 kernel/sched/core.c:7056 Code: 4c 89 e7 e8 d0 f0 bd fc f6 44 24 21 02 74 0b 0f 0b 48 f7 03 08 00 00 00 74 4d bf 01 00 00 00 e8 34 d4 50 fc fb bf 01 00 00 00 a9 e4 ff ff fa bf 01 00 00 00 e8 be d5 50 fc 65 48 8b 1d f6 ec RSP: 0018:ffffc90000e37580 EFLAGS: 00000246 RAX: 1ffff11026c51669 RBX: 1ffff920001c6eb4 RCX: ffffffff85006800 RDX: 1ffff11026c51515 RSI: 0000000000000000 RDI: 0000000000000001 RBP: ffffc90000e37608 R08: ffffffff8792e000 R09: ffffffff8792e008 R10: ffffffff8792e018 R11: ffffffff8792e010 R12: ffffc90000e375a0 R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff920001c6eb0 raw_irqentry_exit_cond_resched+0x2a/0x30 kernel/entry/common.c:390 irqentry_exit+0x30/0x40 kernel/entry/common.c:433 sysvec_apic_timer_interrupt+0x55/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:653 RIP: 0010:arch_atomic64_dec_and_test arch/x86/include/asm/atomic64_64.h:118 [inline] RIP: 0010:arch_atomic_long_dec_and_test include/linux/atomic/atomic-long.h:467 [inline] RIP: 0010:atomic_long_dec_and_test include/linux/atomic/atomic-instrumented.h:1814 [inline] RIP: 0010:fput+0x2a/0x1b0 fs/file_table.c:371 Code: 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 ff e8 2b 86 af ff 49 8d 7f 38 be 08 00 00 00 e8 7d 85 f6 ff 31 db f0 49 ff 4f 38 <41> 0f 94 c6 0f 94 c3 bf 02 00 00 00 89 de e8 93 88 af ff 31 ff 89 RSP: 0018:ffffc90000e37708 EFLAGS: 00000202 RAX: ffffffff81c5ed01 RBX: 0000000000000000 RCX: ffffffff81c5ede3 RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888114361238 RBP: ffffc90000e37730 R08: dffffc0000000000 R09: ffffed102286c248 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88813a7ea528 R13: dffffc0000000000 R14: 000000000000000b R15: ffff888114361200 remove_vma mm/mmap.c:146 [inline] exit_mmap+0x538/0x940 mm/mmap.c:3358 __mmput+0x95/0x310 kernel/fork.c:1298 mmput+0x56/0x170 kernel/fork.c:1321 exit_mm kernel/exit.c:566 [inline] do_exit+0xb29/0x2b80 kernel/exit.c:862 do_group_exit+0x21a/0x2d0 kernel/exit.c:1025 get_signal+0x169d/0x1820 kernel/signal.c:2880 arch_do_signal_or_restart+0xb0/0x16f0 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x74/0xa0 kernel/entry/common.c:168 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:297 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f97e3a7cea9 Code: Unable to access opcode bytes at 0x7f97e3a7ce7f. RSP: 002b:00007f97e47bd178 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000000 RBX: 00007f97e3bb3f88 RCX: 00007f97e3a7cea9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f97e3bb3f88 RBP: 00007f97e3bb3f80 R08: 00007f97e47bd6c0 R09: 00007f97e47bd6c0 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f97e3bb3f8c R13: 000000000000000b R14: 00007ffea70d88d0 R15: 00007ffea70d89b8 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 10 Comm: kworker/u4:1 Not tainted 6.1.78-syzkaller-00003-gdda68b1657b1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:200 Code: 84 00 00 00 00 00 0f 1f 40 00 55 48 89 e5 53 48 89 fb e8 13 00 00 00 48 8b 3d 74 9e f9 05 48 89 de e8 a4 40 46 00 5b 5d c3 cc <55> 48 89 e5 48 8b 45 08 65 48 8b 0d b0 f9 8c 7e 65 8b 15 b1 f9 8c RSP: 0018:ffffc900000a7838 EFLAGS: 00000202 RAX: 0000000000000000 RBX: 1ffff1103ee07919 RCX: ffff888100382880 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc900000a7958 R08: ffffffff816bd865 R09: ffffed103ee2707b R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 R13: 0000000800000000 R14: ffff8881f703c8c8 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc09f7b4018 CR3: 0000000006e0f000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: on_each_cpu_cond_mask+0x40/0x80 kernel/smp.c:1166 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1329 [inline] text_poke_bp_batch+0x1e9/0x730 arch/x86/kernel/alternative.c:1529 text_poke_flush arch/x86/kernel/alternative.c:1720 [inline] text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:1727 arch_jump_label_transform_apply+0x15/0x30 arch/x86/kernel/jump_label.c:146 __jump_label_update+0x36a/0x380 kernel/jump_label.c:455 jump_label_update+0x3af/0x450 kernel/jump_label.c:801 static_key_enable_cpuslocked+0x12f/0x250 kernel/jump_label.c:177 static_key_enable+0x1a/0x30 kernel/jump_label.c:190 toggle_allocation_gate+0xbf/0x450 mm/kfence/core.c:804 process_one_work+0x73d/0xcb0 kernel/workqueue.c:2299 worker_thread+0xa60/0x1260 kernel/workqueue.c:2446 kthread+0x26d/0x300 kernel/kthread.c:386 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306