watchdog: BUG: soft lockup - CPU#1 stuck for 225s! [syz.4.4252:16637]
Modules linked in:
CPU: 1 PID: 16637 Comm: syz.4.4252 Not tainted 5.15.173-syzkaller-00161-gb4bd207b0380 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline]
RIP: 0010:smp_call_function_many_cond+0x843/0x9b0 kernel/smp.c:969
Code: 45 8b 7d 00 44 89 fe 83 e6 01 31 ff e8 e6 a5 0a 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 07 e8 21 a2 0a 00 eb 38 f3 90 <42> 0f b6 04 3b 84 c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 05 a2
RSP: 0018:ffffc90000aa71e0 EFLAGS: 00000246
RAX: ffffffff8165c4ab RBX: 1ffff1103ee07af1 RCX: 0000000000080000
RDX: ffffc90002f26000 RSI: 000000000007ffff RDI: 0000000000080000
RBP: ffffc90000aa72e8 R08: ffffffff8165c47a R09: ffffc90000aa7120
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff8881f703d788 R14: ffff8881f7138e80 R15: dffffc0000000000
FS: 00007f896f9af6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000cf3d CR3: 00000001013fe000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
on_each_cpu_cond_mask+0x40/0x80 kernel/smp.c:1135
on_each_cpu include/linux/smp.h:71 [inline]
flush_tlb_kernel_range+0x49/0x210 arch/x86/mm/tlb.c:1026
__purge_vmap_area_lazy+0x230/0x1690 mm/vmalloc.c:1694
_vm_unmap_aliases+0x339/0x3b0 mm/vmalloc.c:2118
vm_unmap_aliases+0x19/0x20 mm/vmalloc.c:2141
change_page_attr_set_clr+0x308/0x1050 arch/x86/mm/pat/set_memory.c:1740
change_page_attr_clear arch/x86/mm/pat/set_memory.c:1797 [inline]
set_memory_ro+0xa1/0xe0 arch/x86/mm/pat/set_memory.c:1943
bpf_jit_binary_lock_ro include/linux/filter.h:892 [inline]
bpf_int_jit_compile+0xbf21/0xc6b0 arch/x86/net/bpf_jit_comp.c:2422
bpf_prog_select_runtime+0x724/0xa10 kernel/bpf/core.c:1930
bpf_prog_load+0x1315/0x1b50 kernel/bpf/syscall.c:2337
__sys_bpf+0x4bc/0x760 kernel/bpf/syscall.c:4633
__do_sys_bpf kernel/bpf/syscall.c:4737 [inline]
__se_sys_bpf kernel/bpf/syscall.c:4735 [inline]
__x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:4735
x64_sys_call+0x87f/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:322
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f897133dd29
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f896f9af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f897152dfa0 RCX: 00007f897133dd29
RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005
RBP: 00007f89713b9b08 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f897152dfa0 R15: 00007ffd2a44ff18
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 16626 Comm: syz.3.4249 Not tainted 5.15.173-syzkaller-00161-gb4bd207b0380 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:_raw_spin_unlock_irqrestore+0x6b/0x80 kernel/locking/spinlock.c:195
Code: e8 de 80 6d fc 66 90 41 f7 c6 00 02 00 00 74 01 fb bf 01 00 00 00 e8 f4 c9 64 fc 65 8b 05 35 cb 1a 7b 85 c0 74 05 5b 41 5e 5d e8 63 e5 18 fc eb f4 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 90 55
RSP: 0018:ffffc90000f87a20 EFLAGS: 00000082
RAX: 0000000080000001 RBX: ffff888147ba5c24 RCX: 0000000000000002
RDX: 0000000000000000 RSI: 0000000000000046 RDI: 0000000000000001
RBP: ffffc90000f87ab8 R08: ffffffff82e06919 R09: 0000000000000003
R10: fffff520001f0f30 R11: dffffc0000000001 R12: 0000000000000000
R13: ffffffff86e4df20 R14: ffff888147ba5c18 R15: dffffc0000000000
FS: 00007f4c364be6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c2e363d CR3: 00000001258f6000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000097 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__fput+0x228/0x8c0 fs/file_table.c:280
____fput+0x15/0x20 fs/file_table.c:308
task_work_run+0x129/0x190 kernel/task_work.c:188
get_signal+0x15a9/0x1630 kernel/signal.c:2679
arch_do_signal_or_restart+0xbd/0x1680 arch/x86/kernel/signal.c:867
handle_signal_work kernel/entry/common.c:154 [inline]
exit_to_user_mode_loop+0xa0/0xe0 kernel/entry/common.c:178
exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:214
__syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
syscall_exit_to_user_mode+0x26/0x160 kernel/entry/common.c:307
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f4c37e6dd29
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4c364be038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f
RAX: 0000000000000001 RBX: 00007f4c3805e080 RCX: 00007f4c37e6dd29
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000020000080
RBP: 00007f4c37ee9b08 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f4c3805e080 R15: 00007ffe829c7cd8