watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz.0.1278:9830] Modules linked in: irq event stamp: 16271219 hardirqs last enabled at (16271218): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (16271219): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1043 softirqs last enabled at (16248612): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last enabled at (16248612): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last enabled at (16248612): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 softirqs last disabled at (16248615): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (16248615): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (16248615): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 CPU: 0 PID: 9830 Comm: syz.0.1278 Not tainted 6.10.0-syzkaller-04472-g51835949dda3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 RIP: 0010:__read_once_word_nocheck+0xc/0x20 include/asm-generic/rwonce.h:67 Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 53 48 89 fb e8 57 14 55 00 48 8b 03 <5b> c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 RSP: 0018:ffffc900000070d8 EFLAGS: 00000246 RAX: 00007f416a775a19 RBX: ffffc90002f2ffd8 RCX: ffff888067733c00 RDX: 0000000000000102 RSI: 0000000000000001 RDI: ffffc90002f2ffd8 RBP: ffffc90002f28000 R08: ffffffff81412220 R09: ffffffff81412006 R10: 0000000000000003 R11: ffff888067733c00 R12: 1ffff92000000e3a R13: dffffc0000000000 R14: ffffc90000007210 R15: ffffc90002f30000 FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020004000 CR3: 000000005ee6a000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: deref_stack_regs arch/x86/kernel/unwind_orc.c:421 [inline] unwind_next_frame+0x165b/0x2a00 arch/x86/kernel/unwind_orc.c:596 arch_stack_walk+0x151/0x1b0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2196 [inline] slab_free mm/slub.c:4438 [inline] kmem_cache_free+0x145/0x350 mm/slub.c:4513 kfree_skb_reason include/linux/skbuff.h:1260 [inline] __netif_receive_skb_core+0x3edd/0x4570 net/core/dev.c:5634 __netif_receive_skb_one_core net/core/dev.c:5658 [inline] __netif_receive_skb+0x12f/0x650 net/core/dev.c:5774 process_backlog+0x662/0x15b0 net/core/dev.c:6107 __napi_poll+0xcb/0x490 net/core/dev.c:6771 napi_poll net/core/dev.c:6840 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6962 handle_softirqs+0x2c4/0x970 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:rcu_read_unlock_special+0x88/0x550 kernel/rcu/tree_plugin.h:692 Code: f1 f1 f1 00 f2 f2 f2 49 89 04 17 66 41 c7 44 17 09 f3 f3 41 c6 44 17 0b f3 65 44 8b 25 99 80 86 7e 41 f7 c4 00 00 f0 00 74 49 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 3a 00 00 00 00 66 42 c7 44 3a RSP: 0018:ffffc90002f2f260 EFLAGS: 00000206 RAX: b6a49a7d4aa17200 RBX: 1ffff920005e5e54 RCX: ffffffff8173011a RDX: dffffc0000000000 RSI: ffffffff8bcac920 RDI: ffffffff8c2045a0 RBP: ffffc90002f2f340 R08: ffffffff92fcf61f R09: 1ffffffff25f9ec3 R10: dffffc0000000000 R11: fffffbfff25f9ec4 R12: ffffffff8e33ac00 R13: ffff888067734060 R14: ffffc90002f2f2a0 R15: 1ffff920005e5e50 __rcu_read_unlock+0xa1/0x110 kernel/rcu/tree_plugin.h:436 __reset_page_owner+0x2bd/0x3f0 mm/page_owner.c:300 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1093 [inline] free_unref_folios+0xf23/0x19e0 mm/page_alloc.c:2637 folios_put_refs+0x93a/0xa60 mm/swap.c:1024 folios_put include/linux/mm.h:1572 [inline] folio_batch_move_lru+0x5d7/0x690 mm/swap.c:227 lru_add_drain_cpu+0x10e/0x8c0 mm/swap.c:657 lru_add_drain+0x123/0x3e0 mm/swap.c:757 exit_mmap+0x22b/0xc80 mm/mmap.c:3336 __mmput+0x115/0x390 kernel/fork.c:1343 exit_mm+0x220/0x310 kernel/exit.c:566 do_exit+0x9b2/0x27f0 kernel/exit.c:864 do_group_exit+0x207/0x2c0 kernel/exit.c:1026 get_signal+0x16a1/0x1740 kernel/signal.c:2917 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f416a775a19 Code: Unable to access opcode bytes at 0x7f416a7759ef. RSP: 002b:00007f416b4d1048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: 0000000000003000 RBX: 00007f416a903f60 RCX: 00007f416a775a19 RDX: 0000000000023000 RSI: 0000000020000200 RDI: 0000000000000004 RBP: 00007f416a7e4e49 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f416a903f60 R15: 00007fffb94c46b8 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 147 Comm: kworker/u8:5 Not tainted 6.10.0-syzkaller-04472-g51835949dda3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:312 [inline] RIP: 0010:smp_call_function_many_cond+0x1860/0x29d0 kernel/smp.c:856 Code: 45 8b 65 00 44 89 e6 83 e6 01 31 ff e8 89 14 0c 00 41 83 e4 01 49 bc 00 00 00 00 00 fc ff df 75 07 e8 34 10 0c 00 eb 38 f3 90 <42> 0f b6 04 23 84 c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 18 10 RSP: 0018:ffffc90002e3f700 EFLAGS: 00000293 RAX: ffffffff818a4be8 RBX: 1ffff11017288c29 RCX: ffff88801c79da00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc90002e3f8e0 R08: ffffffff818a4bb7 R09: 1ffffffff25f9eb8 R10: dffffc0000000000 R11: fffffbfff25f9eb9 R12: dffffc0000000000 R13: ffff8880b9446148 R14: ffff8880b953f9c0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb51dbb6970 CR3: 000000000e134000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1023 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2085 [inline] text_poke_bp_batch+0x352/0xb30 arch/x86/kernel/alternative.c:2295 text_poke_flush arch/x86/kernel/alternative.c:2486 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2493 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x136/0x260 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xb5/0x250 mm/kfence/core.c:826 process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312 worker_thread+0x86d/0xd40 kernel/workqueue.c:3390 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244