watchdog: BUG: soft lockup - CPU#0 stuck for 143s! [syz.4.21:5995] Modules linked in: irq event stamp: 10850373 hardirqs last enabled at (10850372): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (10850373): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (10694190): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last enabled at (10694190): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last enabled at (10694190): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 softirqs last disabled at (10694193): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (10694193): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (10694193): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 CPU: 0 UID: 0 PID: 5995 Comm: syz.4.21 Not tainted 6.12.0-rc7-syzkaller-g9f8e716d46c6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 RIP: 0010:_compound_head include/linux/page-flags.h:242 [inline] RIP: 0010:virt_to_head_page include/linux/mm.h:1277 [inline] RIP: 0010:page_frag_free+0x4a/0x160 mm/page_alloc.c:4985 Code: 06 49 83 e6 c0 49 bc 00 00 00 00 00 ea ff ff 4b 8d 5c 26 08 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 56 11 0e 00 <48> 8b 03 a8 01 0f 85 e2 00 00 00 4d 01 e6 66 90 49 8d 5e 34 48 89 RSP: 0018:ffffc90000006fa8 EFLAGS: 00000246 RAX: 1ffffd4000192ed1 RBX: ffffea0000c97688 RCX: ffff888032ef9e00 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff8880325daac0 R08: ffffffff8142ffac R09: 1ffffffff203a145 R10: dffffc0000000000 R11: fffffbfff203a146 R12: ffffea0000000000 R13: ffff8880325daac2 R14: 0000000000c97680 R15: dffffc0000000000 FS: 00007f32c0af76c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30e19ff8 CR3: 0000000032d16000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: skb_free_frag include/linux/skbuff.h:3399 [inline] skb_free_head net/core/skbuff.c:1096 [inline] skb_release_data+0x6dc/0x8a0 net/core/skbuff.c:1125 skb_release_all net/core/skbuff.c:1190 [inline] __kfree_skb net/core/skbuff.c:1204 [inline] consume_skb+0x9f/0xf0 net/core/skbuff.c:1436 arp_process+0x1064/0x1ed0 net/ipv4/arp.c:939 NF_HOOK+0x3a5/0x450 include/linux/netfilter.h:314 __netif_receive_skb_list_ptype net/core/dev.c:5718 [inline] __netif_receive_skb_list_core+0x4ed/0x980 net/core/dev.c:5750 __netif_receive_skb_list net/core/dev.c:5812 [inline] netif_receive_skb_list_internal+0xa51/0xe30 net/core/dev.c:5903 gro_normal_list include/net/gro.h:515 [inline] gro_normal_one include/net/gro.h:528 [inline] napi_skb_finish net/core/gro.c:605 [inline] napi_gro_receive+0x5e0/0xcc0 net/core/gro.c:635 virtnet_receive_done+0x118a/0x1bd0 drivers/net/virtio_net.c:2382 receive_buf+0x9a7/0x17d0 drivers/net/virtio_net.c:2426 virtnet_receive_packets drivers/net/virtio_net.c:2724 [inline] virtnet_receive drivers/net/virtio_net.c:2748 [inline] virtnet_poll+0x26b2/0x3980 drivers/net/virtio_net.c:2843 __napi_poll+0xcb/0x490 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6970 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:get_current arch/x86/include/asm/current.h:49 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x8/0x70 kernel/kcov.c:216 Code: 8b 3d 44 28 9d 0c 48 89 de 5b e9 73 e8 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 04 24 <65> 48 8b 0c 25 c0 d7 03 00 65 8b 15 a0 ed 6e 7e 81 e2 00 01 ff 00 RSP: 0018:ffffc90004247578 EFLAGS: 00000202 RAX: ffffffff8188fafb RBX: 1ffff110170e8919 RCX: 0000000000040000 RDX: ffffc9000c782000 RSI: 000000000000499e RDI: 000000000000499f RBP: ffffc90004247780 R08: ffffffff8188faca R09: 1ffffffff285a100 R10: dffffc0000000000 R11: fffffbfff285a101 R12: dffffc0000000000 R13: ffff8880b87448c8 R14: ffff8880b863fc80 R15: 0000000000000001 csd_lock_wait kernel/smp.c:340 [inline] smp_call_function_many_cond+0x1a0b/0x2ca0 kernel/smp.c:884 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1051 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2085 [inline] text_poke_bp_batch+0x352/0xb30 arch/x86/kernel/alternative.c:2295 text_poke_flush arch/x86/kernel/alternative.c:2486 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2493 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x136/0x260 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 tracepoint_add_func+0x953/0x9e0 kernel/tracepoint.c:361 tracepoint_probe_register_prio kernel/tracepoint.c:511 [inline] tracepoint_probe_register+0x105/0x160 kernel/tracepoint.c:531 perf_trace_event_reg kernel/trace/trace_event_perf.c:129 [inline] perf_trace_event_init+0x478/0x930 kernel/trace/trace_event_perf.c:202 perf_trace_init+0x243/0x2e0 kernel/trace/trace_event_perf.c:226 perf_tp_event_init+0x8d/0x110 kernel/events/core.c:10357 perf_try_init_event+0x146/0x810 kernel/events/core.c:11891 perf_init_event kernel/events/core.c:11977 [inline] perf_event_alloc+0x135f/0x2310 kernel/events/core.c:12259 __do_sys_perf_event_open kernel/events/core.c:12766 [inline] __se_sys_perf_event_open+0xb1f/0x3870 kernel/events/core.c:12657 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f32bfd7e719 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f32c0af7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f32bff35f80 RCX: 00007f32bfd7e719 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000240 RBP: 00007f32bfdf175e R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f32bff35f80 R15: 00007fff7d703258 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 6013 Comm: syz-executor Not tainted 6.12.0-rc7-syzkaller-g9f8e716d46c6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 RIP: 0010:check_preemption_disabled+0x2/0x120 lib/smp_processor_id.c:13 Code: 0a 61 8c 48 c7 c6 00 0b 61 8c eb 1c 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 57 <41> 56 41 54 53 48 83 ec 10 65 48 8b 04 25 28 00 00 00 48 89 44 24 RSP: 0000:ffffc900042c74f8 EFLAGS: 00000046 RAX: 0000000000000001 RBX: 0000000000000001 RCX: 0000000080000001 RDX: 0000000000000000 RSI: ffffffff8c0adc40 RDI: ffffffff8c610b20 RBP: 0000000000000001 R08: ffffffff820ba04e R09: 1ffffffff285a100 R10: dffffc0000000000 R11: fffffbfff285a101 R12: 0000000000000246 R13: ffff8880312a1e00 R14: 00000000ffffffff R15: ffffffff8e937da0 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa39d420000 CR3: 0000000059918000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: lockdep_recursion_finish kernel/locking/lockdep.c:467 [inline] lock_is_held_type+0x101/0x190 kernel/locking/lockdep.c:5898 lookup_page_ext mm/page_ext.c:254 [inline] page_ext_get+0x192/0x2a0 mm/page_ext.c:526 page_table_check_set+0x4f/0x540 mm/page_table_check.c:114 __page_table_check_ptes_set+0x30f/0x410 mm/page_table_check.c:225 page_table_check_ptes_set include/linux/page_table_check.h:74 [inline] set_ptes include/linux/pgtable.h:267 [inline] set_pte_range+0x724/0x750 mm/memory.c:5042 filemap_map_order0_folio mm/filemap.c:3623 [inline] filemap_map_pages+0x11c6/0x20d0 mm/filemap.c:3677 do_fault_around mm/memory.c:5255 [inline] do_read_fault mm/memory.c:5288 [inline] do_fault mm/memory.c:5431 [inline] do_pte_missing mm/memory.c:3965 [inline] handle_pte_fault+0x2b98/0x6820 mm/memory.c:5766 __handle_mm_fault mm/memory.c:5909 [inline] handle_mm_fault+0x1106/0x1bb0 mm/memory.c:6077 do_user_addr_fault arch/x86/mm/fault.c:1338 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x459/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7fa39d596913 Code: 8d 1c d6 48 8b 51 70 4c 8b 5a 08 4b 8d 14 3b 4c 0f 45 da 48 81 f9 00 00 00 00 74 37 48 39 de 73 32 66 0f 1f 44 00 00 48 8b 38 <8b> 50 08 4c 01 ff 48 83 fa 26 74 0a 48 83 fa 08 0f 85 1b 0a 00 00 RSP: 002b:00007ffd2a2837a0 EFLAGS: 00010287 RAX: 00007fa39d41fff8 RBX: 00007fa39d439120 RCX: 00007fa39d70d700 RDX: 00007fa39d603bb2 RSI: 00007fa39d4003c0 RDI: 00000000002f5228 RBP: 00007fa39d70d700 R08: 0000000000039150 R09: 00007fa39d439510 R10: 0000000070000025 R11: 00007fa39d4003a0 R12: 00007ffd2a2837e0 R13: 00007ffd2a283968 R14: 00007ffd2a283900 R15: 00007fa39d400000