watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.5:9096] Modules linked in: irq event stamp: 1896093 hardirqs last enabled at (1896092): [] irqentry_exit+0x3b/0x90 hardirqs last disabled at (1896093): [] sysvec_apic_timer_interrupt+0xf/0x80 softirqs last enabled at (1893120): [] handle_softirqs+0x50c/0x770 softirqs last disabled at (1893137): [] __irq_exit_rcu+0xc4/0x100 CPU: 0 UID: 0 PID: 9096 Comm: syz-executor.5 Not tainted 6.12.0-next-20241128 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:kcov_remote_stop+0x263/0x490 Code: e4 75 1d 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f e9 61 28 35 03 e8 6c f6 07 00 e9 ff fd ff ff e8 12 f8 07 00 fb 48 83 c4 18 <5b> 5d 41 5c 41 5d 41 5e 41 5f e9 3e 28 35 03 41 80 7d 60 00 0f 84 RSP: 0018:ffff88806ce09c78 EFLAGS: 00000286 RAX: 00000000001cee82 RBX: ffff88800f778000 RCX: 1ffffffff0fdfecf RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff815210ce RBP: ffff88806ce2da88 R08: 0000000000000001 R09: fffffbfff0fdddf1 R10: ffffffff87eeef8f R11: ffffffff81520ed7 R12: 0000000000000200 R13: 0000000000000000 R14: ffff88803ec328a8 R15: ffff88803477cc40 FS: 00007f417bc83700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555563b32c58 CR3: 000000003f20e000 CR4: 0000000000350ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: ieee80211_rx_list+0x63d/0x2840 ieee80211_rx_napi+0xdc/0x3b0 ieee80211_handle_queued_frames+0xd9/0x130 tasklet_action_common+0x235/0x3b0 handle_softirqs+0x1b1/0x770 __irq_exit_rcu+0xc4/0x100 irq_exit_rcu+0x9/0x20 sysvec_apic_timer_interrupt+0x70/0x80 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:put_cpu_partial+0x10a/0x1b0 Code: 24 28 75 5b 49 c7 44 24 28 00 00 00 00 4c 89 e7 48 8d 35 00 00 00 00 e8 84 92 ab ff 4d 85 ed 74 06 e8 6a 64 d5 ff fb 4d 85 f6 <74> 1c 5b 4c 89 f6 48 89 ef 5d 41 5c 41 5d 41 5e e9 c1 fa ff ff 44 RSP: 0018:ffff88803d4e7800 EFLAGS: 00000246 RAX: 00000000001ce30f RBX: ffffea000027b880 RCX: 1ffffffff0fdfecf RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8184a476 RBP: ffff888008c4f780 R08: 0000000000000001 R09: fffffbfff0fdddf1 R10: ffffffff87eeef8f R11: 0000000000000000 R12: ffff88806ce40350 R13: 0000000000000200 R14: 0000000000000000 R15: ffff888009ee2000 qlist_free_all+0x50/0x160 kasan_quarantine_reduce+0x19f/0x240 __kasan_kmalloc+0x6f/0x90 __kmalloc_node_noprof+0x1f1/0x4a0 __kvmalloc_node_noprof+0x178/0x200 alloc_fdtable+0xd0/0x2a0 dup_fd+0x6e8/0xa80 copy_process+0x21b8/0x8ee0 kernel_clone+0xeb/0x850 __do_sys_clone3+0x1d9/0x260 do_syscall_64+0xbf/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f417e70db19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f417bc83188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 RAX: ffffffffffffffda RBX: 00007f417e820f60 RCX: 00007f417e70db19 RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 RBP: 00007f417e767f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffdc50ba86f R14: 00007f417bc83300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 skipped: idling at default_idle+0x1e/0x30 ---------------- Code disassembly (best guess): 0: e4 75 in $0x75,%al 2: 1d 48 83 c4 18 sbb $0x18c48348,%eax 7: 5b pop %rbx 8: 5d pop %rbp 9: 41 5c pop %r12 b: 41 5d pop %r13 d: 41 5e pop %r14 f: 41 5f pop %r15 11: e9 61 28 35 03 jmpq 0x3352877 16: e8 6c f6 07 00 callq 0x7f687 1b: e9 ff fd ff ff jmpq 0xfffffe1f 20: e8 12 f8 07 00 callq 0x7f837 25: fb sti 26: 48 83 c4 18 add $0x18,%rsp * 2a: 5b pop %rbx <-- trapping instruction 2b: 5d pop %rbp 2c: 41 5c pop %r12 2e: 41 5d pop %r13 30: 41 5e pop %r14 32: 41 5f pop %r15 34: e9 3e 28 35 03 jmpq 0x3352877 39: 41 80 7d 60 00 cmpb $0x0,0x60(%r13) 3e: 0f .byte 0xf 3f: 84 .byte 0x84