watchdog: BUG: soft lockup - CPU#0 stuck for 143s! [syz.2.95:6243] Modules linked in: irq event stamp: 5873955 hardirqs last enabled at (5873954): [] irqentry_exit+0x74/0x90 kernel/entry/common.c:357 hardirqs last disabled at (5873955): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (3283646): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (3283646): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (3283646): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (3283649): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (3283649): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (3283649): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 CPU: 0 UID: 0 PID: 6243 Comm: syz.2.95 Not tainted 6.15.0-rc4-syzkaller-g9325d53fe9ad #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:__kasan_check_byte+0x4/0x40 mm/kasan/common.c:555 Code: c8 49 89 c7 e9 dd fe ff ff 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 <41> 56 53 48 89 f3 49 89 fe e8 1e 12 00 00 84 c0 75 16 be 01 00 00 RSP: 0018:ffffc90000005fb8 EFLAGS: 00000202 RAX: 0000000000000001 RBX: 0000000000000000 RCX: be500431eda4dd00 RDX: 0000000000000000 RSI: ffffffff81f3149d RDI: ffffffff8df3b860 RBP: ffffffff81f31481 R08: 0000000000000000 R09: 0000000000000000 R10: ffffc90000006220 R11: fffff52000000c4b R12: 0000000000000002 R13: ffffffff8df3b860 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8881260ca000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000100000000 CR3: 000000000dd36000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: kasan_check_byte include/linux/kasan.h:399 [inline] lock_acquire+0x8d/0x360 kernel/locking/lockdep.c:5840 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:841 [inline] __perf_output_begin kernel/events/ring_buffer.c:167 [inline] perf_output_begin_forward+0xcd/0xa80 kernel/events/ring_buffer.c:277 __perf_event_output kernel/events/core.c:8355 [inline] perf_event_output_forward+0x2b2/0x430 kernel/events/core.c:8373 __perf_event_overflow+0x7cc/0xe10 kernel/events/core.c:10249 perf_swevent_overflow kernel/events/core.c:10324 [inline] perf_swevent_event+0x2f4/0x5e0 kernel/events/core.c:-1 perf_tp_event+0x4f6/0x1380 kernel/events/core.c:10869 perf_trace_run_bpf_submit+0xee/0x170 kernel/events/core.c:10793 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x2f8/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5877 rcu_lock_release include/linux/rcupdate.h:341 [inline] rcu_read_unlock include/linux/rcupdate.h:871 [inline] class_rcu_destructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0x19a9/0x2390 arch/x86/kernel/unwind_orc.c:680 __unwind_start+0x5b9/0x760 arch/x86/kernel/unwind_orc.c:758 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0xe4/0x150 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4341 [inline] __kmalloc_noprof+0x27a/0x4f0 mm/slub.c:4353 kmalloc_noprof include/linux/slab.h:909 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] ieee802_11_parse_elems_full+0x152/0x2b20 net/mac80211/parse.c:1013 ieee802_11_parse_elems_crc net/mac80211/ieee80211_i.h:2402 [inline] ieee802_11_parse_elems net/mac80211/ieee80211_i.h:2409 [inline] ieee80211_inform_bss+0x10c/0x10a0 net/mac80211/scan.c:79 rdev_inform_bss net/wireless/rdev-ops.h:418 [inline] cfg80211_inform_single_bss_data+0xd02/0x1ac0 net/wireless/scan.c:2367 cfg80211_inform_bss_data+0x1f6/0x3ad0 net/wireless/scan.c:3222 cfg80211_inform_bss_frame_data+0x362/0x700 net/wireless/scan.c:3317 ieee80211_bss_info_update+0x746/0x9e0 net/mac80211/scan.c:226 ieee80211_scan_rx+0x527/0x9b0 net/mac80211/scan.c:340 __ieee80211_rx_handle_packet net/mac80211/rx.c:5179 [inline] ieee80211_rx_list+0x22fc/0x2d80 net/mac80211/rx.c:5416 ieee80211_rx_napi+0x1a8/0x3d0 net/mac80211/rx.c:5439 ieee80211_rx include/net/mac80211.h:5179 [inline] ieee80211_handle_queued_frames+0xe8/0x1f0 net/mac80211/main.c:441 tasklet_action_common+0x369/0x580 kernel/softirq.c:829 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:7090 Code: 24 20 f6 44 24 21 02 74 0c 90 0f 0b 48 f7 03 08 00 00 00 74 64 bf 01 00 00 00 e8 eb 93 39 f6 e8 86 13 70 f6 fb bf 01 00 00 00 4b ab ff ff 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 8b 44 24 RSP: 0018:ffffc9000c1eef80 EFLAGS: 00000282 RAX: be500431eda4dd00 RBX: 0000000000000000 RCX: be500431eda4dd00 RDX: 0000000000000007 RSI: ffffffff8d74a79b RDI: 0000000000000001 RBP: ffffc9000c1ef020 R08: ffffffff8f7ed277 R09: 1ffffffff1efda4e R10: dffffc0000000000 R11: fffffbfff1efda4f R12: 0000000000000000 R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff9200183ddf0 irqentry_exit+0x6f/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:206 [inline] RIP: 0010:arch_test_bit arch/x86/include/asm/bitops.h:238 [inline] RIP: 0010:_test_bit include/asm-generic/bitops/instrumented-non-atomic.h:142 [inline] RIP: 0010:folio_test_swapbacked include/linux/page-flags.h:574 [inline] RIP: 0010:folio_test_swapcache include/linux/page-flags.h:621 [inline] RIP: 0010:free_swap_cache+0x6f/0x300 mm/swap_state.c:227 Code: 31 ff e8 94 75 a6 ff 49 83 e7 01 0f 85 46 02 00 00 48 89 df be 08 00 00 00 e8 9d 8c 08 00 49 89 df 49 c1 ef 03 43 80 3c 27 00 <74> 08 48 89 df e8 17 8a 08 00 48 8b 2b 48 89 ee 48 81 e6 00 00 02 RSP: 0018:ffffc9000c1ef0e8 EFLAGS: 00000246 RAX: ffffffff82194e01 RBX: ffffea0001c0b940 RCX: ffffffff82194e33 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffea0001c0b940 RBP: ffffc9000c1ef3a8 R08: ffffea0001c0b947 R09: 1ffffd4000381728 R10: dffffc0000000000 R11: fffff94000381729 R12: dffffc0000000000 R13: 1ffffd4000381729 R14: ffffea0001c0b948 R15: 1ffffd4000381728 free_pages_and_swap_cache+0x17a/0x520 mm/swap_state.c:260 __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline] tlb_batch_pages_flush mm/mmu_gather.c:149 [inline] tlb_flush_mmu_free mm/mmu_gather.c:397 [inline] tlb_flush_mmu+0x3a0/0x680 mm/mmu_gather.c:404 zap_pte_range mm/memory.c:1770 [inline] zap_pmd_range mm/memory.c:1823 [inline] zap_pud_range mm/memory.c:1852 [inline] zap_p4d_range mm/memory.c:1873 [inline] unmap_page_range+0x37fd/0x4210 mm/memory.c:1894 unmap_vmas+0x25d/0x3c0 mm/memory.c:1984 exit_mmap+0x245/0xba0 mm/mmap.c:1284 __mmput+0x118/0x420 kernel/fork.c:1379 exit_mm+0x1da/0x2c0 kernel/exit.c:589 do_exit+0x859/0x2550 kernel/exit.c:940 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x125e/0x1310 kernel/signal.c:3034 arch_do_signal_or_restart+0x95/0x780 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x8b/0x120 kernel/entry/common.c:218 do_syscall_64+0x103/0x210 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcc8778e969 Code: Unable to access opcode bytes at 0x7fcc8778e93f. RSP: 002b:00007fcc88579038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: fffffffffffffff5 RBX: 00007fcc879b5fa0 RCX: 00007fcc8778e969 RDX: 000000000000005a RSI: 0000200000000880 RDI: 0000000000000005 RBP: 00007fcc87810ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fcc879b5fa0 R15: 00007ffeffeca818 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 6273 Comm: syz.3.103 Not tainted 6.15.0-rc4-syzkaller-g9325d53fe9ad #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:strlen+0x3f/0x70 lib/string.c:420 Code: 00 00 00 00 fc ff df 48 89 fb 49 89 c7 48 89 d8 48 c1 e8 03 42 0f b6 04 30 84 c0 75 11 48 ff c3 49 8d 47 01 42 80 7c 3f 01 00 <75> de eb 19 89 d9 80 e1 07 38 c1 7c e6 49 89 fc 48 89 df e8 c9 db RSP: 0018:ffffc90000a083b8 EFLAGS: 00000006 RAX: 0000000000000003 RBX: ffffffff8b6bb964 RCX: ffff8880296a1e00 RDX: ffffffff81eee37f RSI: ffffffff8df3b860 RDI: ffffffff8b6bb960 RBP: ffffc90000a084c8 R08: ffffc90000a084b7 R09: 0000000000000000 R10: ffffc90000a084a0 R11: fffff52000141097 R12: 1ffff92000141084 R13: ffffffff81eee37f R14: dffffc0000000000 R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff8881261ca000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffcb8932dcc CR3: 0000000032406000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: _Z16__fortify_strlenPKcU25pass_dynamic_object_size1 include/linux/fortify-string.h:268 [inline] trace_event_get_offsets_lock include/trace/events/lock.h:50 [inline] do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0xc2/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5877 rcu_lock_release include/linux/rcupdate.h:341 [inline] rcu_read_unlock include/linux/rcupdate.h:871 [inline] __perf_event_output kernel/events/core.c:8364 [inline] perf_event_output_forward+0x37f/0x430 kernel/events/core.c:8373 __perf_event_overflow+0x7cc/0xe10 kernel/events/core.c:10249 perf_swevent_hrtimer+0x3c2/0x540 kernel/events/core.c:11613 __run_hrtimer kernel/time/hrtimer.c:1761 [inline] __hrtimer_run_queues+0x4dd/0xc60 kernel/time/hrtimer.c:1825 hrtimer_interrupt+0x45b/0xaa0 kernel/time/hrtimer.c:1887 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline] __sysvec_apic_timer_interrupt+0x108/0x410 arch/x86/kernel/apic/apic.c:1055 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0x52/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:tasklet_action_common+0x100/0x580 kernel/softirq.c:819 Code: b8 00 00 00 00 00 fc ff df 48 89 4c 24 30 80 3c 01 00 74 08 48 89 df e8 3e 02 9c 00 4d 89 64 24 08 e8 14 65 41 00 fb 4d 85 ff <49> bc 00 00 00 00 00 fc ff df 0f 84 1e 04 00 00 b8 01 00 00 00 44 RSP: 0018:ffffc90000a08d40 EFLAGS: 00000282 RAX: 17a25e9a0c9e9800 RBX: ffff8880b8923908 RCX: 17a25e9a0c9e9800 RDX: 0000000000000002 RSI: ffffffff8d74a79b RDI: ffffffff8bc1d0a0 RBP: ffffc90000a08e30 R08: ffffffff8f7ed277 R09: 1ffffffff1efda4e R10: dffffc0000000000 R11: fffffbfff1efda4f R12: ffff8880b8923900 R13: 0000000000000006 R14: 0000000000000006 R15: ffff88807d3f1608 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:check_kcov_mode kernel/kcov.c:194 [inline] RIP: 0010:write_comp_data kernel/kcov.c:246 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x37/0x90 kernel/kcov.c:321 Code: 08 60 75 92 65 8b 15 68 9c b5 10 81 e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 57 83 b9 3c 16 00 00 00 74 4e 8b 91 18 16 00 00 <83> fa 03 75 43 48 8b 91 20 16 00 00 44 8b 89 1c 16 00 00 49 c1 e1 RSP: 0018:ffffc9000c327390 EFLAGS: 00000246 RAX: ffffffff822cdd70 RBX: ffffffff822cdc5d RCX: ffff8880296a1e00 RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000000 RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff822cdc5d R12: dffffc0000000000 R13: ffffea000000000f R14: 000000000006fd9e R15: ffff88813fffa5a0 pfn_valid+0x1e0/0x420 include/linux/mmzone.h:2126 page_table_check_clear+0x21/0x6e0 mm/page_table_check.c:70 ptep_get_and_clear_full arch/x86/include/asm/jump_label.h:-1 [inline] get_and_clear_full_ptes include/linux/pgtable.h:714 [inline] zap_present_folio_ptes mm/memory.c:1501 [inline] zap_present_ptes mm/memory.c:1586 [inline] do_zap_pte_range mm/memory.c:1687 [inline] zap_pte_range mm/memory.c:1731 [inline] zap_pmd_range mm/memory.c:1823 [inline] zap_pud_range mm/memory.c:1852 [inline] zap_p4d_range mm/memory.c:1873 [inline] unmap_page_range+0x30be/0x4210 mm/memory.c:1894 unmap_vmas+0x25d/0x3c0 mm/memory.c:1984 exit_mmap+0x245/0xba0 mm/mmap.c:1284 __mmput+0x118/0x420 kernel/fork.c:1379 exit_mm+0x1da/0x2c0 kernel/exit.c:589 do_exit+0x859/0x2550 kernel/exit.c:940 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x125e/0x1310 kernel/signal.c:3034 arch_do_signal_or_restart+0x95/0x780 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x8b/0x120 kernel/entry/common.c:218 do_syscall_64+0x103/0x210 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0218d8e969 Code: Unable to access opcode bytes at 0x7f0218d8e93f. RSP: 002b:00007f0219c2c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: 000000000000000b RBX: 00007f0218fb5fa0 RCX: 00007f0218d8e969 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000020 RBP: 00007f0218e10ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f0218fb5fa0 R15: 00007fff91040fd8