watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz.5.5726:23296] Modules linked in: irq event stamp: 0 hardirqs last enabled at (0): [<0000000000000000>] 0x0 hardirqs last disabled at (0): [] rcu_lock_acquire include/linux/rcupdate.h:337 [inline] hardirqs last disabled at (0): [] rcu_read_lock include/linux/rcupdate.h:849 [inline] hardirqs last disabled at (0): [] copy_process+0x9fa/0x3d50 kernel/fork.c:2244 softirqs last enabled at (0): [] rcu_lock_acquire include/linux/rcupdate.h:337 [inline] softirqs last enabled at (0): [] rcu_read_lock include/linux/rcupdate.h:849 [inline] softirqs last enabled at (0): [] copy_process+0x9fa/0x3d50 kernel/fork.c:2244 softirqs last disabled at (0): [<0000000000000000>] 0x0 CPU: 0 UID: 0 PID: 23296 Comm: syz.5.5726 Not tainted 6.12.0-syzkaller-09092-gbd74e238ae69 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:unwind_next_frame+0x142/0x22d0 arch/x86/kernel/unwind_orc.c:494 Code: 0f 85 b8 19 00 00 4c 0f be 7d 00 48 8b 44 24 30 42 80 3c 20 00 48 8b 5c 24 18 74 08 48 89 df e8 44 a9 be 00 4c 03 3b 49 ff cf <4c> 89 6c 24 08 4c 89 74 24 68 48 89 2c 24 0f 84 0c 01 00 00 48 c7 RSP: 0018:ffffc90000006f30 EFLAGS: 00000286 RAX: 1ffff92000000e09 RBX: ffffc90000007048 RCX: ffffffff9a426903 RDX: dffffc0000000000 RSI: ffffffff81f489d5 RDI: 0000000000000001 RBP: ffffc90000007035 R08: 0000000000000002 R09: ffffc900000070f0 R10: ffffc90000007050 R11: ffffffff81819e90 R12: dffffc0000000000 R13: ffffc90000007000 R14: ffffffff81f489d5 R15: ffffffff81f489d4 FS: 00007fc4f8dd56c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002000a000 CR3: 00000000607f6000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4085 [inline] slab_alloc_node mm/slub.c:4134 [inline] kmem_cache_alloc_noprof+0x135/0x2a0 mm/slub.c:4141 skb_clone+0x20c/0x390 net/core/skbuff.c:2084 dev_queue_xmit_nit+0x249/0xca0 net/core/dev.c:2315 xmit_one net/core/dev.c:3586 [inline] dev_hard_start_xmit+0x15f/0x7e0 net/core/dev.c:3606 __dev_queue_xmit+0x1b73/0x3f50 net/core/dev.c:4434 dev_queue_xmit include/linux/netdevice.h:3168 [inline] hsr_xmit net/hsr/hsr_forward.c:430 [inline] hsr_forward_do net/hsr/hsr_forward.c:571 [inline] hsr_forward_skb+0x171c/0x2ac0 net/hsr/hsr_forward.c:728 send_hsr_supervision_frame+0x63b/0xcc0 net/hsr/hsr_device.c:351 hsr_announce+0x1f8/0x3a0 net/hsr/hsr_device.c:408 call_timer_fn+0x18e/0x650 kernel/time/timer.c:1793 expire_timers kernel/time/timer.c:1844 [inline] __run_timers kernel/time/timer.c:2418 [inline] __run_timer_base+0x66a/0x8e0 kernel/time/timer.c:2430 run_timer_base kernel/time/timer.c:2439 [inline] run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2449 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:655 irq_exit_rcu+0x9/0x30 kernel/softirq.c:671 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:preempt_schedule_irq+0xf6/0x1c0 kernel/sched/core.c:7078 Code: 89 f5 49 c1 ed 03 eb 0d 48 f7 03 08 00 00 00 0f 84 8b 00 00 00 bf 01 00 00 00 e8 65 7f 89 f5 e8 50 3a c3 f5 fb bf 01 00 00 00 85 ab ff ff 43 80 7c 3d 00 00 74 08 4c 89 f7 e8 05 56 26 f6 48 RSP: 0018:ffffc9000c46eda0 EFLAGS: 00000286 RAX: 530da41854454900 RBX: 1ffff9200188ddbc RCX: ffffffff819da71c RDX: dffffc0000000000 RSI: ffffffff8c6154c0 RDI: 0000000000000001 RBP: ffffc9000c46ee60 R08: ffffffff901e4077 R09: 1ffffffff203c80e R10: dffffc0000000000 R11: fffffbfff203c80f R12: 1ffff9200188ddb4 R13: 1ffff9200188ddb8 R14: ffffc9000c46edc0 R15: dffffc0000000000 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:arch_static_branch arch/x86/include/asm/jump_label.h:27 [inline] RIP: 0010:page_table_check_free include/linux/page_table_check.h:38 [inline] RIP: 0010:free_pages_prepare mm/page_alloc.c:1128 [inline] RIP: 0010:free_unref_page+0x494/0x1140 mm/page_alloc.c:2657 Code: 2f 0f 00 48 b8 00 00 80 ff 7f 00 80 ff 49 23 06 48 b9 00 00 00 00 00 f0 7f 00 48 09 c1 49 89 0e 4c 8b 6c 24 08 e9 55 09 00 00 65 09 00 00 49 be 00 00 00 00 80 08 05 00 41 83 fd 20 0f 83 16 RSP: 0018:ffffc9000c46ef20 EFLAGS: 00000286 RAX: ffffffff820b26b9 RBX: 0000000000000000 RCX: 0000000000080000 RDX: ffffc9000eb08000 RSI: 00000000000062b7 RDI: 00000000000062b8 RBP: 0000000000000000 R08: ffffffff820b26ac R09: 1ffff1100e3f8fcb R10: dffffc0000000000 R11: ffffed100e3f8fcc R12: ffffea0001fdbe08 R13: 0000000000000003 R14: ffffea0001fdbe00 R15: dffffc0000000000 __slab_free+0x31b/0x3d0 mm/slub.c:4490 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4085 [inline] slab_alloc_node mm/slub.c:4134 [inline] kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4186 kmalloc_reserve+0xa8/0x2a0 net/core/skbuff.c:587 __alloc_skb+0x1f3/0x440 net/core/skbuff.c:678 alloc_skb_fclone include/linux/skbuff.h:1373 [inline] tcp_stream_alloc_skb+0x3d/0x310 net/ipv4/tcp.c:886 tcp_connect+0x11ee/0x4940 net/ipv4/tcp_output.c:4128 tcp_v4_connect+0x1127/0x1ba0 net/ipv4/tcp_ipv4.c:341 __inet_stream_connect+0x262/0xf30 net/ipv4/af_inet.c:677 tcp_sendmsg_fastopen+0x3a2/0x5d0 net/ipv4/tcp.c:1039 tcp_sendmsg_locked+0x48d2/0x4f30 net/ipv4/tcp.c:1091 tcp_sendmsg+0x30/0x50 net/ipv4/tcp.c:1358 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg+0x1a6/0x270 net/socket.c:726 ____sys_sendmsg+0x52a/0x7e0 net/socket.c:2583 ___sys_sendmsg net/socket.c:2637 [inline] __sys_sendmsg+0x269/0x350 net/socket.c:2669 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc4faf7ff19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc4f8dd5058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fc4fb146080 RCX: 00007fc4faf7ff19 RDX: 0000000020000811 RSI: 0000000020000fc0 RDI: 0000000000000005 RBP: 00007fc4faff3986 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fc4fb146080 R15: 00007ffca5c85988 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 23285 Comm: syz.6.5725 Not tainted 6.12.0-syzkaller-09092-gbd74e238ae69 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:trace_event_get_offsets_lock include/trace/events/lock.h:50 [inline] RIP: 0010:do_perf_trace_lock include/trace/events/lock.h:50 [inline] RIP: 0010:perf_trace_lock+0x105/0x490 include/trace/events/lock.h:50 Code: d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 e1 a7 90 00 48 8b 03 48 85 c0 48 c7 c7 40 c3 0a 8c 48 0f 45 f8 48 89 7c 24 40 f6 15 5b 0a 48 89 44 24 18 49 8d 5f 60 48 89 d8 48 c1 e8 03 42 RSP: 0018:ffffc90000a17100 EFLAGS: 00000086 RAX: ffffffff8c0d0560 RBX: ffff8880b872c8b0 RCX: 0000000000a17103 RDX: ffffffff81833d67 RSI: ffff8880b872c898 RDI: ffffffff8c0d0560 RBP: ffffc90000a17210 R08: ffffffff901e4077 R09: 1ffffffff203c80e R10: dffffc0000000000 R11: fffffbfff203c80f R12: dffffc0000000000 R13: ffffffff81833d67 R14: ffff8880b872c898 R15: ffffffff8e806ae0 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fedc5e00210 CR3: 0000000012e7a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x9cc/0xa30 kernel/locking/lockdep.c:5860 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:149 [inline] _raw_spin_unlock_irqrestore+0x79/0x140 kernel/locking/spinlock.c:194 __run_hrtimer kernel/time/hrtimer.c:1735 [inline] __hrtimer_run_queues+0x477/0xd50 kernel/time/hrtimer.c:1803 hrtimer_interrupt+0x403/0xa40 kernel/time/hrtimer.c:1865 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline] __sysvec_apic_timer_interrupt+0x110/0x420 arch/x86/kernel/apic/apic.c:1055 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0x52/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:87 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x86/0x290 mm/kasan/generic.c:189 Code: 00 fc ff df 4f 8d 3c 31 4c 89 fd 4c 29 dd 48 83 fd 10 7f 29 48 85 ed 0f 84 3e 01 00 00 4c 89 cd 48 f7 d5 48 01 dd 41 80 3b 00 <0f> 85 c9 01 00 00 49 ff c3 48 ff c5 75 ee e9 1e 01 00 00 45 89 dc RSP: 0018:ffffc90000a17770 EFLAGS: 00000246 RAX: ffff8880541b3c01 RBX: 1ffff92000142f04 RCX: ffffffff814240a6 RDX: 0000000000000001 RSI: 0000000000000060 RDI: ffffc90000a17820 RBP: fffffffffffffff7 R08: ffffc90000a1787f R09: 1ffff92000142f0f R10: dffffc0000000000 R11: fffff52000142f07 R12: 0000000000000000 R13: ffffffff81819e90 R14: dffffc0000000001 R15: fffff52000142f10 __asan_memset+0x23/0x50 mm/kasan/shadow.c:84 __unwind_start+0x36/0x740 arch/x86/kernel/unwind_orc.c:688 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0xe5/0x150 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4264 [inline] __kmalloc_noprof+0x1fc/0x400 mm/slub.c:4276 kmalloc_noprof include/linux/slab.h:883 [inline] kzalloc_noprof include/linux/slab.h:1015 [inline] ieee802_11_parse_elems_full+0xdb/0x2880 net/mac80211/parse.c:958 ieee802_11_parse_elems_crc net/mac80211/ieee80211_i.h:2386 [inline] ieee802_11_parse_elems net/mac80211/ieee80211_i.h:2393 [inline] ieee80211_inform_bss+0x15f/0x1080 net/mac80211/scan.c:79 rdev_inform_bss net/wireless/rdev-ops.h:418 [inline] cfg80211_inform_single_bss_data+0xec1/0x2090 net/wireless/scan.c:2334 cfg80211_inform_bss_data+0x3ce/0x5e80 net/wireless/scan.c:3189 cfg80211_inform_bss_frame_data+0x3b8/0x720 net/wireless/scan.c:3284 ieee80211_bss_info_update+0x8a7/0xbc0 net/mac80211/scan.c:226 ieee80211_scan_rx+0x526/0x9c0 net/mac80211/scan.c:340 __ieee80211_rx_handle_packet net/mac80211/rx.c:5232 [inline] ieee80211_rx_list+0x2c44/0x3810 net/mac80211/rx.c:5469 ieee80211_rx_napi+0x18a/0x3c0 net/mac80211/rx.c:5492 ieee80211_rx include/net/mac80211.h:5163 [inline] ieee80211_handle_queued_frames+0xe7/0x1e0 net/mac80211/main.c:441 tasklet_action_common+0x426/0x620 kernel/softirq.c:804 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:655 irq_exit_rcu+0x9/0x30 kernel/softirq.c:671 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:check_preemption_disabled+0x4/0x120 lib/smp_processor_id.c:13 Code: 8c 48 c7 c6 c0 54 61 8c eb 1c 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 57 41 56 <41> 54 53 48 83 ec 10 65 48 8b 04 25 28 00 00 00 48 89 44 24 08 65 RSP: 0018:ffffc9000be3eee8 EFLAGS: 00000246 RAX: 0000000000000002 RBX: 1ffff920017c7dec RCX: ffffffff81713e10 RDX: 0000000000000000 RSI: ffffffff8c105bc0 RDI: ffffffff8c6154e0 RBP: ffffc9000be3eff0 R08: ffffffff901e4077 R09: 1ffffffff203c80e R10: dffffc0000000000 R11: fffffbfff203c80f R12: 0000000000000000 R13: dffffc0000000000 R14: ffff8880296b3e28 R15: ffff8880296b3e28 trace_call_bpf+0x613/0x8a0 kernel/trace/bpf_trace.c:151 perf_trace_run_bpf_submit+0x82/0x180 kernel/events/core.c:10473 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x388/0x490 include/trace/events/lock.h:50 trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x9cc/0xa30 kernel/locking/lockdep.c:5860 rcu_lock_release include/linux/rcupdate.h:347 [inline] rcu_read_unlock include/linux/rcupdate.h:880 [inline] page_ext_put+0xa3/0xc0 mm/page_ext.c:550 get_and_clear_full_ptes include/linux/pgtable.h:705 [inline] zap_present_folio_ptes mm/memory.c:1502 [inline] zap_present_ptes mm/memory.c:1585 [inline] zap_pte_range mm/memory.c:1627 [inline] zap_pmd_range mm/memory.c:1753 [inline] zap_pud_range mm/memory.c:1782 [inline] zap_p4d_range mm/memory.c:1803 [inline] unmap_page_range+0x2b41/0x4230 mm/memory.c:1824 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1914 exit_mmap+0x275/0xc40 mm/mmap.c:1667 __mmput+0x115/0x390 kernel/fork.c:1347 exit_mm+0x220/0x310 kernel/exit.c:570 do_exit+0x9b2/0x28e0 kernel/exit.c:925 do_group_exit+0x207/0x2c0 kernel/exit.c:1087 get_signal+0x16b2/0x1750 kernel/signal.c:3016 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xce/0x340 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc0a097ff19 Code: Unable to access opcode bytes at 0x7fc0a097feef. RSP: 002b:00007fc0a186b058 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: 000000000000000b RBX: 00007fc0a0b45fa0 RCX: 00007fc0a097ff19 RDX: 0000000000000300 RSI: 0200000000000002 RDI: 0000000000000011 RBP: 00007fc0a09f3986 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fc0a0b45fa0 R15: 00007fff52a22cc8