watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz.1.31:6002] Modules linked in: irq event stamp: 10802803 hardirqs last enabled at (10802802): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (10802803): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (10436946): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last enabled at (10436946): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last enabled at (10436946): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 softirqs last disabled at (10436949): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (10436949): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (10436949): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 CPU: 1 UID: 0 PID: 6002 Comm: syz.1.31 Not tainted 6.12.0-rc5-syzkaller-g6c52d4da1c74 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:__in6_dev_get include/net/addrconf.h:330 [inline] RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:421 [inline] RIP: 0010:find_match+0xbf/0xc10 net/ipv6/route.c:744 Code: bb c0 00 00 00 48 03 18 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 48 89 df e8 14 ec 91 f7 4c 8b 23 ac 61 5a 01 89 c3 31 ff 89 c6 e8 81 31 28 f7 85 db 74 1a e8 a8 RSP: 0018:ffffc90000a17f60 EFLAGS: 00000246 RAX: 1ffff1100c044c18 RBX: ffff8880602260c0 RCX: dffffc0000000000 RDX: ffff888033683c00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff888020732cb8 R08: ffffffff8a6cac6f R09: ffffc90000a18290 R10: ffffc90000a18280 R11: fffff5200014301e R12: ffff88805fc09000 R13: ffff888020732ccf R14: 1ffff110040e6599 R15: 1ffff110040e6597 FS: 00007fb8be9d76c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000100000000 CR3: 0000000029ace000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: __find_rr_leaf+0x275/0x8e0 net/ipv6/route.c:832 find_rr_leaf net/ipv6/route.c:853 [inline] rt6_select net/ipv6/route.c:897 [inline] fib6_table_lookup+0x413/0xbb0 net/ipv6/route.c:2195 ip6_pol_route+0x273/0x15d0 net/ipv6/route.c:2231 pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x58c/0x790 net/ipv6/fib6_rules.c:117 ip6_route_input_lookup net/ipv6/route.c:2300 [inline] ip6_route_input+0x859/0xd90 net/ipv6/route.c:2596 ip6_rcv_finish+0x144/0x180 net/ipv6/ip6_input.c:77 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x1ea/0x650 net/core/dev.c:5783 process_backlog+0x662/0x15b0 net/core/dev.c:6115 __napi_poll+0xcb/0x490 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6970 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:get_current arch/x86/include/asm/current.h:49 [inline] RIP: 0010:write_comp_data kernel/kcov.c:245 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x8/0x90 kernel/kcov.c:314 Code: 44 0a 20 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 4c 8b 04 24 <65> 48 8b 14 25 c0 d7 03 00 65 8b 05 50 f9 6e 7e 25 00 01 ff 00 74 RSP: 0018:ffffc900049bf778 EFLAGS: 00000287 RAX: ffffffff8188e497 RBX: 0000000000000001 RCX: 0000000000040000 RDX: ffffc900044c2000 RSI: 0000000000000001 RDI: 0000000000000007 RBP: ffffc900049bf980 R08: ffffffff8188e4aa R09: 1ffff110170e7f92 R10: dffffc0000000000 R11: ffffed10170e7f93 R12: dffffc0000000000 R13: ffff8880b873fc80 R14: 0000000000000001 R15: ffff8880b873fc88 cpu_max_bits_warn include/linux/cpumask.h:135 [inline] cpumask_check include/linux/cpumask.h:142 [inline] cpumask_test_cpu include/linux/cpumask.h:570 [inline] cpu_online include/linux/cpumask.h:1117 [inline] trace_ipi_send_cpu include/trace/events/ipi.h:38 [inline] send_call_function_single_ipi kernel/smp.c:116 [inline] smp_call_function_many_cond+0x13aa/0x2ca0 kernel/smp.c:866 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1051 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2085 [inline] text_poke_bp_batch+0x352/0xb30 arch/x86/kernel/alternative.c:2295 text_poke_flush arch/x86/kernel/alternative.c:2486 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2493 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_disable_cpuslocked+0xd2/0x1c0 kernel/jump_label.c:240 static_key_disable+0x1a/0x20 kernel/jump_label.c:248 tracepoint_remove_func kernel/tracepoint.c:417 [inline] tracepoint_probe_unregister+0x6f2/0x990 kernel/tracepoint.c:551 trace_event_reg+0x154/0x270 perf_trace_event_unreg+0xb4/0x1b0 kernel/trace/trace_event_perf.c:162 perf_trace_destroy+0xa2/0x140 kernel/trace/trace_event_perf.c:241 _free_event+0xb7d/0xf60 kernel/events/core.c:5357 __do_sys_perf_event_open kernel/events/core.c:13040 [inline] __se_sys_perf_event_open+0x1a1e/0x3870 kernel/events/core.c:12657 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb8bdb7e719 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb8be9d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007fb8bdd35f80 RCX: 00007fb8bdb7e719 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 RBP: 00007fb8bdbf132e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fb8bdd35f80 R15: 00007ffc8ca4e318 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 6003 Comm: syz.3.30 Not tainted 6.12.0-rc5-syzkaller-g6c52d4da1c74 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:trace_lock_acquire include/trace/events/lock.h:24 [inline] RIP: 0010:lock_acquire+0xa9/0x550 kernel/locking/lockdep.c:5796 Code: f2 4b 89 04 2c 43 c7 44 2c 09 f2 f2 f2 00 43 c7 44 2c 11 f3 f3 f3 f3 66 43 c7 44 2c 15 f3 f3 43 c6 44 2c 17 f3 cc bf 03 00 00 <65> 8b 05 cc 8f 93 7e 83 f8 08 0f 83 f4 02 00 00 89 c3 48 89 d8 48 RSP: 0018:ffffc90000007a40 EFLAGS: 00000806 RAX: f2f2f200f1f1f1f1 RBX: 1ffff92000000f78 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff9a5d43d8 RBP: ffffc90000007b88 R08: 0000000000000001 R09: 0000000000000000 R10: ffffc90000007c80 R11: fffff52000000f92 R12: 1ffff92000000f50 R13: dffffc0000000000 R14: 0000000000000000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe0dfd32060 CR3: 000000006357a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162 debug_object_deactivate+0x158/0x390 lib/debugobjects.c:763 debug_hrtimer_deactivate kernel/time/hrtimer.c:428 [inline] debug_deactivate+0x1b/0x220 kernel/time/hrtimer.c:484 __run_hrtimer kernel/time/hrtimer.c:1659 [inline] __hrtimer_run_queues+0x305/0xd50 kernel/time/hrtimer.c:1755 hrtimer_interrupt+0x396/0x990 kernel/time/hrtimer.c:1817 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline] __sysvec_apic_timer_interrupt+0x110/0x420 arch/x86/kernel/apic/apic.c:1055 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:trace_lock_acquire include/trace/events/lock.h:24 [inline] RIP: 0010:lock_acquire+0xa9/0x550 kernel/locking/lockdep.c:5796 Code: f2 4b 89 04 2c 43 c7 44 2c 09 f2 f2 f2 00 43 c7 44 2c 11 f3 f3 f3 f3 66 43 c7 44 2c 15 f3 f3 43 c6 44 2c 17 f3 cc bf 03 00 00 <65> 8b 05 cc 8f 93 7e 83 f8 08 0f 83 f4 02 00 00 89 c3 48 89 d8 48 RSP: 0018:ffffc90004af7120 EFLAGS: 00000a02 RAX: f2f2f200f1f1f1f1 RBX: 0000000000000180 RCX: 0000000000000002 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8e937d20 RBP: ffffc90004af7270 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffff94000335d09 R12: 1ffff9200095ee2c R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88813fffa6c0 rcu_lock_acquire include/linux/rcupdate.h:337 [inline] rcu_read_lock_sched include/linux/rcupdate.h:941 [inline] pfn_valid+0x113/0x450 include/linux/mmzone.h:2043 page_table_check_clear+0x1e/0x550 mm/page_table_check.c:70 get_and_clear_full_ptes include/linux/pgtable.h:684 [inline] zap_present_folio_ptes mm/memory.c:1496 [inline] zap_present_ptes mm/memory.c:1579 [inline] zap_pte_range mm/memory.c:1621 [inline] zap_pmd_range mm/memory.c:1739 [inline] zap_pud_range mm/memory.c:1768 [inline] zap_p4d_range mm/memory.c:1789 [inline] unmap_page_range+0x2a13/0x40e0 mm/memory.c:1810 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1900 exit_mmap+0x275/0xc40 mm/mmap.c:1912 __mmput+0x115/0x390 kernel/fork.c:1347 exit_mm+0x220/0x310 kernel/exit.c:571 do_exit+0x9b2/0x28e0 kernel/exit.c:926 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 get_signal+0x16a3/0x1740 kernel/signal.c:2917 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7cf557e719 Code: Unable to access opcode bytes at 0x7f7cf557e6ef. RSP: 002b:00007f7cf6403038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 00007f7cf5735f80 RCX: 00007f7cf557e719 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 RBP: 00007f7cf55f132e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f7cf5735f80 R15: 00007ffd1eb0ebc8