watchdog: BUG: soft lockup - CPU#0 stuck for 226s! [syz-executor.0:3781] Modules linked in: CPU: 0 PID: 3781 Comm: syz-executor.0 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:434 [inline] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5ba/0xc40 kernel/locking/qspinlock.c:508 Code: 00 00 49 89 dc c6 03 00 48 8b 44 24 10 0f b6 04 10 84 c0 0f 85 48 01 00 00 48 8b 44 24 08 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 5e 41 0f b6 44 15 00 84 c0 75 36 41 80 3f 00 75 ea 4c 89 RSP: 0018:ffffc90000d868c0 EFLAGS: 00000206 RAX: 0000000000000000 RBX: 00000000ffffb740 RCX: ffffffff8154fa7f RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881293de158 RBP: ffffc90000d869b0 R08: dffffc0000000000 R09: ffffed102527bc2c R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881f7037ed4 R13: 1ffff1102527bc2b R14: 1ffff1103ee00001 R15: ffff8881293de158 FS: 00007f75cf57d6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2de21000 CR3: 000000011e1ec000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:585 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:85 [inline] do_raw_spin_lock include/linux/spinlock.h:187 [inline] __raw_spin_lock_bh include/linux/spinlock_api_smp.h:136 [inline] _raw_spin_lock_bh+0x139/0x1b0 kernel/locking/spinlock.c:178 sock_hash_delete_elem+0xb1/0x2f0 net/core/sock_map.c:937 bpf_prog_2c29ac5cdc6b1842+0x3a/0x5f8 bpf_dispatcher_nop_func include/linux/bpf.h:785 [inline] __bpf_prog_run include/linux/filter.h:625 [inline] bpf_prog_run include/linux/filter.h:632 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1883 [inline] bpf_trace_run4+0x13f/0x270 kernel/trace/bpf_trace.c:1922 __bpf_trace_mm_page_alloc+0xbf/0xf0 include/trace/events/kmem.h:201 trace_mm_page_alloc include/trace/events/kmem.h:201 [inline] __alloc_pages+0x3cb/0x8f0 mm/page_alloc.c:5798 __alloc_pages_node include/linux/gfp.h:591 [inline] alloc_pages_node include/linux/gfp.h:605 [inline] alloc_pages include/linux/gfp.h:618 [inline] __stack_depot_save+0x38d/0x470 lib/stackdepot.c:326 stack_depot_save+0xe/0x10 lib/stackdepot.c:383 save_stack+0x104/0x1e0 mm/page_owner.c:140 __set_page_owner+0x28/0x2e0 mm/page_owner.c:200 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook+0x1a3/0x1b0 mm/page_alloc.c:2604 prep_new_page+0x1b/0x110 mm/page_alloc.c:2610 get_page_from_freelist+0x3550/0x35d0 mm/page_alloc.c:4484 __alloc_pages+0x27e/0x8f0 mm/page_alloc.c:5776 __alloc_pages_node include/linux/gfp.h:591 [inline] alloc_pages_node include/linux/gfp.h:605 [inline] alloc_pages include/linux/gfp.h:618 [inline] __stack_depot_save+0x38d/0x470 lib/stackdepot.c:326 kasan_save_stack mm/kasan/common.c:39 [inline] kasan_set_track+0x5d/0x70 mm/kasan/common.c:45 kasan_set_free_info+0x23/0x40 mm/kasan/generic.c:370 ____kasan_slab_free+0x126/0x160 mm/kasan/common.c:365 __kasan_slab_free+0x11/0x20 mm/kasan/common.c:373 kasan_slab_free include/linux/kasan.h:193 [inline] slab_free_hook mm/slub.c:1723 [inline] slab_free_freelist_hook+0xbd/0x190 mm/slub.c:1749 slab_free mm/slub.c:3519 [inline] kfree+0xc8/0x220 mm/slub.c:4579 sk_psock_free_link include/linux/skmsg.h:420 [inline] sock_map_del_link net/core/sock_map.c:160 [inline] sock_map_unref+0x352/0x4d0 net/core/sock_map.c:182 sock_hash_delete_elem+0x274/0x2f0 net/core/sock_map.c:941 bpf_prog_2c29ac5cdc6b1842+0x3a/0x5f8 bpf_dispatcher_nop_func include/linux/bpf.h:785 [inline] __bpf_prog_run include/linux/filter.h:625 [inline] bpf_prog_run include/linux/filter.h:632 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1883 [inline] bpf_trace_run4+0x13f/0x270 kernel/trace/bpf_trace.c:1922 __bpf_trace_mm_page_alloc+0xbf/0xf0 include/trace/events/kmem.h:201 trace_mm_page_alloc include/trace/events/kmem.h:201 [inline] __alloc_pages+0x3cb/0x8f0 mm/page_alloc.c:5798 __alloc_pages_node include/linux/gfp.h:591 [inline] alloc_pages_node include/linux/gfp.h:605 [inline] alloc_pages include/linux/gfp.h:618 [inline] kmalloc_order+0x4a/0x160 mm/slab_common.c:975 kmalloc_order_trace+0x1a/0xb0 mm/slab_common.c:994 kmalloc_large include/linux/slab.h:532 [inline] __kmalloc+0x19c/0x270 mm/slub.c:4416 __kmalloc_node include/linux/slab.h:469 [inline] kmalloc_node include/linux/slab.h:626 [inline] __bpf_map_area_alloc kernel/bpf/syscall.c:322 [inline] bpf_map_area_alloc+0x4c/0xf0 kernel/bpf/syscall.c:335 prealloc_init kernel/bpf/hashtab.c:323 [inline] htab_map_alloc+0xab2/0x1440 kernel/bpf/hashtab.c:547 find_and_alloc_map kernel/bpf/syscall.c:129 [inline] map_create+0x411/0x2050 kernel/bpf/syscall.c:857 __sys_bpf+0x296/0x760 kernel/bpf/syscall.c:4615 __do_sys_bpf kernel/bpf/syscall.c:4737 [inline] __se_sys_bpf kernel/bpf/syscall.c:4735 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:4735 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f75d0809ca9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f75cf57d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f75d0937f80 RCX: 00007f75d0809ca9 RDX: 0000000000000048 RSI: 00000000200009c0 RDI: 0000000000000000 RBP: 00007f75d085547e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f75d0937f80 R15: 00007ffe535c5138 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 3743 Comm: syz-executor.4 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:arch_static_branch arch/x86/include/asm/jump_label.h:27 [inline] RIP: 0010:static_key_false include/linux/jump_label.h:235 [inline] RIP: 0010:native_write_msr arch/x86/include/asm/msr.h:156 [inline] RIP: 0010:wrmsr arch/x86/include/asm/msr.h:263 [inline] RIP: 0010:native_apic_msr_write+0x39/0x50 arch/x86/include/asm/apic.h:207 Code: 74 05 83 ff 30 75 12 5d c3 81 ff d0 00 00 00 74 f6 81 ff e0 00 00 00 74 ee c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <66> 90 eb d9 89 f6 31 d2 e8 6a 7e 51 01 5d c3 0f 1f 84 00 00 00 00 RSP: 0018:ffffc900001d0df8 EFLAGS: 00000046 RAX: 000000000000010f RBX: ffffffff8602a9c8 RCX: 0000000000000838 RDX: 0000000000000000 RSI: 000000000000010f RDI: 0000000000000838 RBP: ffffc900001d0df8 R08: ffffffff816391eb R09: ffffffff816390dd R10: 0000000000000002 R11: ffff8881197613c0 R12: 0000000000000020 R13: dffffc0000000000 R14: 000000000000010f R15: dffffc0000000000 FS: 00007f8e722b46c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffe535c52f8 CR3: 000000012b60f000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: apic_write arch/x86/include/asm/apic.h:394 [inline] lapic_next_event+0x5f/0x70 arch/x86/kernel/apic/apic.c:468 clockevents_program_event+0x1c1/0x300 kernel/time/clockevents.c:334 tick_program_event+0x9f/0x120 kernel/time/tick-oneshot.c:44 hrtimer_interrupt+0x625/0xaa0 kernel/time/hrtimer.c:1824 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1085 [inline] __sysvec_apic_timer_interrupt+0xfd/0x3c0 arch/x86/kernel/apic/apic.c:1102 sysvec_apic_timer_interrupt+0x95/0xc0 arch/x86/kernel/apic/apic.c:1096 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:pv_wait_node kernel/locking/qspinlock_paravirt.h:302 [inline] RIP: 0010:__pv_queued_spin_lock_slowpath+0x36e/0xc40 kernel/locking/qspinlock.c:473 Code: 48 89 df be 01 00 00 00 e8 7f 53 5d 00 b0 01 31 c9 f0 0f b0 0b 41 bc 00 80 00 00 48 ba 00 00 00 00 00 fc ff df 41 0f b6 04 16 <84> c0 0f 85 ac 00 00 00 48 8b 44 24 08 83 38 00 0f 85 15 01 00 00 RSP: 0018:ffffc90000b16a40 EFLAGS: 00000206 RAX: 0000000000000000 RBX: ffff8881f7137ed4 RCX: 0000000000000000 RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffff8881f7137ed4 RBP: ffffc90000b16b30 R08: dffffc0000000000 R09: ffffed103ee26fdb R10: 0000000000000000 R11: dffffc0000000001 R12: 00000000000022fc R13: 1ffff1102527bc2b R14: 1ffff1103ee26fd9 R15: ffff8881293de158 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:585 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:85 [inline] do_raw_spin_lock include/linux/spinlock.h:187 [inline] __raw_spin_lock_bh include/linux/spinlock_api_smp.h:136 [inline] _raw_spin_lock_bh+0x139/0x1b0 kernel/locking/spinlock.c:178 sock_hash_delete_elem+0xb1/0x2f0 net/core/sock_map.c:937 bpf_prog_2c29ac5cdc6b1842+0x3a/0x5f8 bpf_dispatcher_nop_func include/linux/bpf.h:785 [inline] __bpf_prog_run include/linux/filter.h:625 [inline] bpf_prog_run include/linux/filter.h:632 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1883 [inline] bpf_trace_run4+0x13f/0x270 kernel/trace/bpf_trace.c:1922 __bpf_trace_mm_page_alloc+0xbf/0xf0 include/trace/events/kmem.h:201 trace_mm_page_alloc include/trace/events/kmem.h:201 [inline] __alloc_pages+0x3cb/0x8f0 mm/page_alloc.c:5798 allocate_slab mm/slub.c:1932 [inline] new_slab+0x9a/0x4e0 mm/slub.c:1995 ___slab_alloc+0x39e/0x830 mm/slub.c:3028 __slab_alloc+0x4a/0x90 mm/slub.c:3115 slab_alloc_node mm/slub.c:3206 [inline] slab_alloc mm/slub.c:3248 [inline] __kmalloc_track_caller+0x16c/0x260 mm/slub.c:4945 copy_array kernel/bpf/verifier.c:776 [inline] copy_stack_state kernel/bpf/verifier.c:827 [inline] copy_func_state kernel/bpf/verifier.c:944 [inline] copy_verifier_state+0x862/0xcc0 kernel/bpf/verifier.c:980 push_stack+0x19d/0x4f0 kernel/bpf/verifier.c:1051 check_cond_jmp_op kernel/bpf/verifier.c:9277 [inline] do_check+0xceac/0xf2c0 kernel/bpf/verifier.c:11398 do_check_common+0x909/0x1290 kernel/bpf/verifier.c:13408 do_check_main kernel/bpf/verifier.c:13471 [inline] bpf_check+0x3835/0x12bf0 kernel/bpf/verifier.c:14042 bpf_prog_load+0x12ac/0x1b50 kernel/bpf/syscall.c:2333 __sys_bpf+0x4bc/0x760 kernel/bpf/syscall.c:4633 __do_sys_bpf kernel/bpf/syscall.c:4737 [inline] __se_sys_bpf kernel/bpf/syscall.c:4735 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:4735 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f8e73540ca9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8e722b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f8e7366ef80 RCX: 00007f8e73540ca9 RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 RBP: 00007f8e7358c47e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f8e7366ef80 R15: 00007fff2681e118