watchdog: BUG: soft lockup - CPU#1 stuck for 122s! [syz.7.740:9070] Modules linked in: irq event stamp: 12955265 hardirqs last enabled at (12955264): [] irqentry_exit+0x59c/0x620 kernel/entry/common.c:219 hardirqs last disabled at (12955265): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056 softirqs last enabled at (12714056): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (12714056): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (12714056): [] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 softirqs last disabled at (12714059): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (12714059): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (12714059): [] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 CPU: 1 UID: 0 PID: 9070 Comm: syz.7.740 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 RIP: 0010:rcu_read_unlock_special+0x1d/0x420 kernel/rcu/tree_plugin.h:770 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 55 41 57 41 56 41 55 41 54 53 48 83 ec 10 65 8b 2d eb 2f 48 11 f7 c5 00 00 f0 00 74 14 <48> 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d e9 40 c2 ef 09 cc 49 89 RSP: 0018:ffffc90000a08888 EFLAGS: 00000206 RAX: 0000000000000002 RBX: 0000000000000246 RCX: 0000000000000101 RDX: 0000000000000000 RSI: ffffffff8dccc94a RDI: ffffffff8c073c80 RBP: ffff8881257f7000 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: ffffffff8e5605b8 R13: dffffc0000000000 R14: 0000000000000002 R15: ffff8880b873b8e8 FS: 00007f1cefc326c0(0000) GS:ffff8881257f7000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2e217ff8 CR3: 000000005bf86000 CR4: 00000000003526f0 DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __rcu_read_unlock+0x83/0xe0 kernel/rcu/tree_plugin.h:438 rcu_read_unlock include/linux/rcupdate.h:899 [inline] class_rcu_destructor include/linux/rcupdate.h:1195 [inline] is_module_text_address+0x190/0x1e0 kernel/module/main.c:3858 kernel_text_address+0x94/0xe0 kernel/extable.c:119 __kernel_text_address+0xd/0x30 kernel/extable.c:79 unwind_get_return_address+0x4d/0x90 arch/x86/kernel/unwind_orc.c:385 arch_stack_walk+0xfb/0x150 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:584 poison_slab_object mm/kasan/common.c:253 [inline] __kasan_slab_free+0x5c/0x80 mm/kasan/common.c:285 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:2540 [inline] slab_free mm/slub.c:6670 [inline] kfree+0x1be/0x650 mm/slub.c:6878 slab_free_after_rcu_debug+0x5e/0x250 mm/slub.c:6716 rcu_do_batch kernel/rcu/tree.c:2605 [inline] rcu_core+0xc9e/0x1750 kernel/rcu/tree.c:2857 handle_softirqs+0x22a/0x7c0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:preempt_schedule_irq+0x48/0xa0 kernel/sched/core.c:7190 Code: 49 be 00 00 00 00 00 fc ff df eb 09 48 f7 03 10 00 00 00 74 53 bf 01 00 00 00 e8 f3 63 fa f5 e8 3e e0 33 f6 fb bf 01 00 00 00 43 a9 ff ff 9c 58 fa a9 00 02 00 00 74 05 e8 c4 e1 33 f6 bf 01 RSP: 0018:ffffc900048ff5e0 EFLAGS: 00000206 RAX: 00000000004af203 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff8dccc94a RDI: 0000000000000001 RBP: 0000000000000000 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: 0000000000000000 R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000 irqentry_exit+0x597/0x620 kernel/entry/common.c:216 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:should_resched arch/x86/include/asm/preempt.h:104 [inline] RIP: 0010:__local_bh_enable_ip+0xd8/0x130 kernel/softirq.c:457 Code: 8b e8 5c 51 10 0a 65 66 8b 05 3c 87 6b 11 66 85 c0 75 32 bf 01 00 00 00 e8 f5 cb 0b 00 e8 a0 46 45 00 fb 65 8b 05 18 87 6b 11 <85> c0 75 05 e8 4f b0 ac ff 5b 41 5e c3 cc cc cc cc cc 90 0f 0b 90 RSP: 0018:ffffc900048ff708 EFLAGS: 00000206 RAX: 0000000000000000 RBX: 0000000000000201 RCX: 0000000000000046 RDX: 0000000000000000 RSI: ffffffff8dccc94a RDI: ffffffff8c073c80 RBP: ffffc900048ff868 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: 0000000000000000 R13: 1ffff110281d9169 R14: ffffffff89aa5eab R15: dffffc0000000000 netlink_insert+0x105b/0x1360 net/netlink/af_netlink.c:589 netlink_autobind+0x22d/0x300 net/netlink/af_netlink.c:826 netlink_sendmsg+0x531/0xb40 net/netlink/af_netlink.c:1857 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __x64_sys_sendmsg+0x1bd/0x2a0 net/socket.c:2681 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1ceed9aeb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1cefc32028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f1cef015fa0 RCX: 00007f1ceed9aeb9 RDX: 0000000000044050 RSI: 0000200000000180 RDI: 000000000000000b RBP: 00007f1ceee08c1f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f1cef016038 R14: 00007f1cef015fa0 R15: 00007ffeeec1a208 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 36 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xcea/0x1270 kernel/smp.c:877 Code: 89 ee 83 e6 01 31 ff e8 c4 db 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 6f d7 0b 00 eb 38 f3 90 42 0f b6 04 2b <84> c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 53 d7 0b 00 eb e4 44 RSP: 0000:ffffc90000ac76a0 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 1ffff110170e8129 RCX: ffff888140af9e80 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc90000ac77e0 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: ffff8880b8740948 R13: dffffc0000000000 R14: ffff8880b863bb00 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881256f7000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff1ea362ff8 CR3: 000000000e346000 CR4: 00000000003526f0 DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 Call Trace: on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1043 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2711 [inline] smp_text_poke_batch_finish+0x5f5/0x1160 arch/x86/kernel/alternative.c:2921 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x128/0x240 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xab/0x250 mm/kfence/core.c:874 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xaec/0x17a0 kernel/workqueue.c:3340 worker_thread+0xda6/0x1360 kernel/workqueue.c:3421 kthread+0x726/0x8b0 kernel/kthread.c:463 ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246