watchdog: BUG: soft lockup - CPU#0 stuck for 119s! [syz.7.1831:12329] Modules linked in: irq event stamp: 22571615 hardirqs last enabled at (22571614): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (22571615): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (22529552): [] __do_softirq kernel/softirq.c:595 [inline] softirqs last enabled at (22529552): [] invoke_softirq kernel/softirq.c:435 [inline] softirqs last enabled at (22529552): [] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 softirqs last disabled at (22529555): [] __do_softirq kernel/softirq.c:595 [inline] softirqs last disabled at (22529555): [] invoke_softirq kernel/softirq.c:435 [inline] softirqs last disabled at (22529555): [] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 CPU: 0 UID: 0 PID: 12329 Comm: syz.7.1831 Not tainted 6.13.0-syzkaller-g9af5c78155a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:ip_rcv_core+0x239/0xd10 net/ipv4/ip_input.c:494 Code: c0 0f 85 24 08 00 00 48 89 5c 24 28 0f b7 03 48 01 c5 49 89 ef 49 c1 ef 03 43 0f b6 04 37 84 c0 0f 85 21 08 00 00 0f b6 5d 00 <41> 89 de 41 80 e6 0f 89 de 83 e6 0f bf 04 00 00 00 e8 a1 bd 72 f7 RSP: 0018:ffffc90000007820 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000045 RCX: ffff8880717d0000 RDX: 0000000000000100 RSI: 000000000000006a RDI: 0000000000000014 RBP: ffff88803653401e R08: ffffffff8a4cb15a R09: 1ffff11008cf8844 R10: dffffc0000000000 R11: ffffed1008cf8845 R12: 1ffff11004da3440 R13: ffff8880467c4140 R14: dffffc0000000000 R15: 1ffff11006ca6803 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1b2f8d8740 CR3: 000000006191c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: ip_rcv+0x4f/0x90 net/ipv4/ip_input.c:563 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5941 process_backlog+0x662/0x15b0 net/core/dev.c:6289 __napi_poll+0xcb/0x490 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:7297 handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:preempt_schedule_irq+0xf6/0x1c0 kernel/sched/core.c:7086 Code: 89 f5 49 c1 ed 03 eb 0d 48 f7 03 08 00 00 00 0f 84 8b 00 00 00 bf 01 00 00 00 e8 25 5c 97 f5 e8 50 e5 d0 f5 fb bf 01 00 00 00 25 ab ff ff 43 80 7c 3d 00 00 74 08 4c 89 f7 e8 65 b7 2f f6 48 RSP: 0018:ffffc900032f6da0 EFLAGS: 00000286 RAX: c5990a04676d5600 RBX: 1ffff9200065edbc RCX: ffffffff819b4cfa RDX: dffffc0000000000 RSI: ffffffff8c0aa660 RDI: 0000000000000001 RBP: ffffc900032f6e60 R08: ffffffff942f6877 R09: 1ffffffff285ed0e R10: dffffc0000000000 R11: fffffbfff285ed0f R12: 1ffff9200065edb4 R13: 1ffff9200065edb8 R14: ffffc900032f6dc0 R15: dffffc0000000000 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:free_swap_cache+0xa2/0x3e0 mm/swap_state.c:291 Code: 89 ef e8 a1 18 09 00 49 8b 6d 00 41 bc 00 00 02 00 be 00 00 02 00 48 21 ee 31 ff e8 98 87 a2 ff 49 21 ec 75 0a e8 ae 82 a2 ff aa 01 00 00 49 89 dc 48 8b 04 24 80 3c 18 00 74 08 4c 89 f7 e8 RSP: 0018:ffffc900032f6f20 EFLAGS: 00000293 RAX: ffffffff821ce9e2 RBX: dffffc0000000000 RCX: ffff8880717d0000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00fff18000000004 R08: ffffffff821ce9d8 R09: 1ffffd400031e9a0 R10: dffffc0000000000 R11: fffff9400031e9a1 R12: 0000000000000000 R13: ffffea00018f4d00 R14: ffffea00018f4d08 R15: 1ffffd400031e9a0 free_pages_and_swap_cache+0x1d2/0x690 mm/swap_state.c:324 __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline] tlb_batch_pages_flush mm/mmu_gather.c:149 [inline] tlb_flush_mmu_free mm/mmu_gather.c:389 [inline] tlb_flush_mmu+0x3a3/0x680 mm/mmu_gather.c:396 zap_pte_range mm/memory.c:1770 [inline] zap_pmd_range mm/memory.c:1823 [inline] zap_pud_range mm/memory.c:1852 [inline] zap_p4d_range mm/memory.c:1873 [inline] unmap_page_range+0x3e1b/0x48d0 mm/memory.c:1894 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1984 exit_mmap+0x283/0xd40 mm/mmap.c:1284 __mmput+0x115/0x420 kernel/fork.c:1345 exit_mm+0x220/0x310 kernel/exit.c:570 do_exit+0x9ad/0x28e0 kernel/exit.c:925 do_group_exit+0x207/0x2c0 kernel/exit.c:1087 get_signal+0x16b2/0x1750 kernel/signal.c:3036 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xce/0x340 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc1f318cda9 Code: Unable to access opcode bytes at 0x7fc1f318cd7f. RSP: 002b:00007fc1f3f13038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffea RBX: 00007fc1f33a5fa0 RCX: 00007fc1f318cda9 RDX: 0000000000000090 RSI: 0000000020000880 RDI: 0000000000000005 RBP: 00007fc1f320e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fc1f33a5fa0 R15: 00007ffd0d4266e8 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 10124 Comm: kworker/u8:30 Not tainted 6.13.0-syzkaller-g9af5c78155a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline] RIP: 0010:smp_call_function_many_cond+0x1bb2/0x2d30 kernel/smp.c:885 Code: 01 31 ff e8 b0 e8 0b 00 41 83 e4 01 4c 8b 64 24 68 75 07 e8 60 e4 0b 00 eb 41 f3 90 48 b8 00 00 00 00 00 fc ff df 0f b6 04 03 <84> c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 3b e4 0b 00 eb db 44 RSP: 0018:ffffc90005577640 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 1ffff110170c8c91 RCX: ffff888026361e00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc90005577840 R08: ffffffff81b38820 R09: 1ffffffff285ed08 R10: dffffc0000000000 R11: fffffbfff285ed09 R12: ffff8880b873fb08 R13: ffff8880b8646488 R14: ffff8880b873fb00 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055dcd9db2e40 CR3: 000000000e738000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 Call Trace: on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1052 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2114 [inline] text_poke_bp_batch+0x352/0xb30 arch/x86/kernel/alternative.c:2324 text_poke_flush arch/x86/kernel/alternative.c:2515 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2522 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x136/0x260 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xbc/0x260 mm/kfence/core.c:849 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3317 worker_thread+0x870/0xd30 kernel/workqueue.c:3398 kthread+0x7a9/0x920 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244