watchdog: BUG: soft lockup - CPU#0 stuck for 122s! [syz.4.499:8566] Modules linked in: irq event stamp: 10692197 hardirqs last enabled at (10692196): [] irqentry_exit+0x74/0x90 kernel/entry/common.c:357 hardirqs last disabled at (10692197): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (10404264): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (10404264): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (10404264): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (10404267): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (10404267): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (10404267): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 CPU: 0 UID: 0 PID: 8566 Comm: syz.4.499 Not tainted 6.15.0-rc4-syzkaller-gb4432656b36e #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:trace_call_bpf+0x604/0x850 kernel/trace/bpf_trace.c:153 Code: 00 00 00 65 48 8b 05 9b 66 aa 10 48 3b 84 24 a0 00 00 00 0f 85 4c 02 00 00 44 89 f8 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d cc cc cc cc cc e8 21 e5 f4 ff e9 b8 fb ff ff e8 17 e5 f4 ff e9 RSP: 0018:ffffc900000065a0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: c72611302e1c6300 RDX: 0000000000000009 RSI: ffffffff8b703380 RDI: ffffffff8bc1cde0 RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff81cad457 R12: ffffe8ffffcba000 R13: ffffffff8de0ab40 R14: ffff8880b8832608 R15: ffffffff8de0aba8 FS: 00007f98b75486c0(0000) GS:ffff8881260cc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f91a6624866 CR3: 000000002568c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10788 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x2f8/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5877 rcu_lock_release include/linux/rcupdate.h:341 [inline] rcu_read_unlock include/linux/rcupdate.h:871 [inline] class_rcu_destructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0x19a9/0x2390 arch/x86/kernel/unwind_orc.c:680 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4161 [inline] slab_alloc_node mm/slub.c:4210 [inline] kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4217 skb_clone+0x212/0x3a0 net/core/skbuff.c:2056 dev_queue_xmit_nit+0x416/0xcc0 net/core/dev.c:2501 xmit_one net/core/dev.c:3772 [inline] dev_hard_start_xmit+0x1d5/0x880 net/core/dev.c:3792 sch_direct_xmit+0x241/0x4b0 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:4018 [inline] __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4595 NF_HOOK+0x30d/0x3a0 include/linux/netfilter.h:314 arp_xmit+0x16c/0x270 net/ipv4/arp.c:664 arp_process+0x13ae/0x17a0 net/ipv4/arp.c:854 NF_HOOK+0x30d/0x3a0 include/linux/netfilter.h:314 __netif_receive_skb_list_ptype net/core/dev.c:5935 [inline] __netif_receive_skb_list_core+0x757/0x800 net/core/dev.c:5977 __netif_receive_skb_list net/core/dev.c:6029 [inline] netif_receive_skb_list_internal+0x975/0xcc0 net/core/dev.c:6120 gro_normal_list include/net/gro.h:532 [inline] napi_complete_done+0x2f2/0x7c0 net/core/dev.c:6490 virtqueue_napi_complete drivers/net/virtio_net.c:737 [inline] virtnet_poll+0x2385/0x2d70 drivers/net/virtio_net.c:3053 __napi_poll+0xc4/0x480 net/core/dev.c:7324 napi_poll net/core/dev.c:7388 [inline] net_rx_action+0x6ea/0xdf0 net/core/dev.c:7510 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:rcu_read_unlock_special+0x87/0x4c0 kernel/rcu/tree_plugin.h:694 Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 e2 a3 cd 10 41 f7 c6 00 00 f0 00 74 49 <48> c7 44 24 40 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b RSP: 0018:ffffc9000c20f360 EFLAGS: 00000206 RAX: c72611302e1c6300 RBX: 1ffff92001841e74 RCX: c72611302e1c6300 RDX: 0000000000000006 RSI: ffffffff8d749f78 RDI: ffffffff8bc1cde0 RBP: ffffc9000c20f460 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e R10: dffffc0000000000 R11: fffffbfff1efda6f R12: ffffffff8df40c00 R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 __rcu_read_unlock+0x84/0xe0 kernel/rcu/tree_plugin.h:438 rcu_read_unlock include/linux/rcupdate.h:873 [inline] trace_call_bpf+0x5ae/0x850 kernel/trace/bpf_trace.c:148 perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10788 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x2f8/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5877 __raw_spin_unlock include/linux/spinlock_api_smp.h:141 [inline] _raw_spin_unlock+0x16/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] __free_frozen_pages+0x690/0xcd0 mm/page_alloc.c:2754 discard_slab mm/slub.c:2730 [inline] __put_partials+0x161/0x1c0 mm/slub.c:3199 put_cpu_partial+0x17c/0x250 mm/slub.c:3274 __slab_free+0x2f7/0x400 mm/slub.c:4526 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4161 [inline] slab_alloc_node mm/slub.c:4210 [inline] kmem_cache_alloc_node_noprof+0x1bb/0x3c0 mm/slub.c:4262 alloc_task_struct_node kernel/fork.c:180 [inline] dup_task_struct+0x52/0x860 kernel/fork.c:1128 copy_process+0x544/0x3b80 kernel/fork.c:2259 kernel_clone+0x21e/0x870 kernel/fork.c:2844 __do_sys_clone kernel/fork.c:2987 [inline] __se_sys_clone kernel/fork.c:2971 [inline] __x64_sys_clone+0x18b/0x1e0 kernel/fork.c:2971 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f98b678e969 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f98b7547fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f98b69b6080 RCX: 00007f98b678e969 RDX: 0000200000000140 RSI: 0000200000000650 RDI: 0000000046042200 RBP: 00007f98b6810ab1 R08: 0000200000001b40 R09: 0000200000001b40 R10: 0000200000000f80 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f98b69b6080 R15: 00007ffc343d5d78 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 8520 Comm: dhcpcd-run-hook Not tainted 6.15.0-rc4-syzkaller-gb4432656b36e #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:match_held_lock+0x7d/0xc0 kernel/locking/lockdep.c:5335 Code: e0 d6 1d 93 48 29 d0 48 c1 f8 03 48 ba 29 5c 8f c2 f5 28 5c 8f 48 0f af d0 bb 01 00 00 00 48 39 ca 74 02 31 db 89 d8 5b 41 5e cc cc cc cc cc 90 e8 67 22 5f f9 85 c0 74 22 83 3d 40 24 29 04 RSP: 0018:ffffc90000a08350 EFLAGS: 00000046 RAX: 0000000000000001 RBX: ffff88807d804768 RCX: 80570c9ded458500 RDX: ffff88807d803c00 RSI: ffffffff8df3b860 RDI: ffff88807d804768 RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000080000 R10: 0000000000000000 R11: ffffffff81cad457 R12: 0000000000000046 R13: ffff88807d803c00 R14: ffffffff8df3b860 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8881261cc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffdec2f20b8 CR3: 0000000043038000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __lock_is_held kernel/locking/lockdep.c:5599 [inline] lock_is_held_type+0xa8/0x190 kernel/locking/lockdep.c:5938 trace_call_bpf+0x1ad/0x850 kernel/trace/bpf_trace.c:146 perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10788 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x2f8/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5877 rcu_lock_release include/linux/rcupdate.h:341 [inline] rcu_read_unlock include/linux/rcupdate.h:871 [inline] is_bpf_text_address+0x28d/0x2b0 kernel/bpf/core.c:774 kernel_text_address+0xa5/0xe0 kernel/extable.c:125 __kernel_text_address+0xd/0x40 kernel/extable.c:79 unwind_get_return_address+0x4d/0x90 arch/x86/kernel/unwind_orc.c:369 arch_stack_walk+0xfc/0x150 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4161 [inline] slab_alloc_node mm/slub.c:4210 [inline] kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4217 kmem_alloc_batch lib/debugobjects.c:371 [inline] fill_pool+0x100/0x570 lib/debugobjects.c:403 debug_objects_fill_pool lib/debugobjects.c:725 [inline] debug_object_activate+0x383/0x420 lib/debugobjects.c:814 debug_hrtimer_activate kernel/time/hrtimer.c:445 [inline] debug_activate kernel/time/hrtimer.c:484 [inline] enqueue_hrtimer+0x30/0x3a0 kernel/time/hrtimer.c:1088 __run_hrtimer kernel/time/hrtimer.c:1778 [inline] __hrtimer_run_queues+0x656/0xc60 kernel/time/hrtimer.c:1825 hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1842 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline] RIP: 0010:smp_call_function_many_cond+0xe69/0x11c0 kernel/smp.c:885 Code: 00 45 8b 2f 44 89 ee 83 e6 01 31 ff e8 20 6d 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 cb 68 0b 00 eb 37 f3 90 <43> 0f b6 04 2c 84 c0 75 10 41 f7 07 01 00 00 00 74 1e e8 b0 68 0b RSP: 0018:ffffc9000c6d7700 EFLAGS: 00000293 RAX: ffffffff81b45620 RBX: ffff8880b893ad40 RCX: ffff88807d803c00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc9000c6d7860 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e R10: dffffc0000000000 R11: fffffbfff1efda6f R12: 1ffff11017108245 R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8880b8841228 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1052 __flush_tlb_multi arch/x86/include/asm/paravirt.h:91 [inline] flush_tlb_multi arch/x86/mm/tlb.c:1275 [inline] flush_tlb_mm_range+0x6ae/0x12b0 arch/x86/mm/tlb.c:1365 tlb_flush arch/x86/include/asm/tlb.h:23 [inline] tlb_flush_mmu_tlbonly include/asm-generic/tlb.h:480 [inline] tlb_flush_mmu+0x1a7/0x680 mm/mmu_gather.c:403 tlb_finish_mmu+0xc3/0x1d0 mm/mmu_gather.c:496 exit_mmap+0x474/0xba0 mm/mmap.c:1297 __mmput+0x118/0x420 kernel/fork.c:1379 exit_mm+0x1da/0x2c0 kernel/exit.c:589 do_exit+0x859/0x2550 kernel/exit.c:940 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 __do_sys_exit_group kernel/exit.c:1113 [inline] __se_sys_exit_group kernel/exit.c:1111 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1111 x64_sys_call+0x21ba/0x21c0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1dbde34a90 Code: Unable to access opcode bytes at 0x7f1dbde34a66. RSP: 002b:00007ffdec2f2028 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000055e040cbd910 RCX: 00007f1dbde34a90 RDX: 00000000000000e7 RSI: 000000000000003c RDI: 0000000000000000 RBP: 00007ffdec2f2358 R08: 000055e040cbdc58 R09: 1d43e911b7c7f0e4 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdec2f2350 R13: 00007ffdec2f2360 R14: 000055e00fca4169 R15: 00007f1dbe033a80