ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [kworker/u8:20:6281] Modules linked in: irq event stamp: 2921470 hardirqs last enabled at (2921469): [] irqentry_exit+0x1dd/0x8c0 kernel/entry/common.c:219 hardirqs last disabled at (2921470): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056 softirqs last enabled at (2921468): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (2921468): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (2921468): [] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723 softirqs last disabled at (2921437): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (2921437): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (2921437): [] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723 CPU: 1 UID: 0 PID: 6281 Comm: kworker/u8:20 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:native_pause arch/x86/include/asm/vdso/processor.h:13 [inline] RIP: 0010:cpu_relax arch/x86/include/asm/vdso/processor.h:18 [inline] RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xdfb/0x15e0 kernel/smp.c:877 Code: ed 74 57 48 8b 54 24 10 4c 89 74 24 10 49 89 d5 48 89 d5 48 89 54 24 18 49 c1 ed 03 83 e5 07 4d 01 e5 83 c5 03 e8 65 5b 0c 00 90 41 0f b6 45 00 40 38 c5 7c 08 84 c0 0f 85 b6 05 00 00 8b 43 RSP: 0018:ffffc90004def808 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b8443020 RCX: ffffffff81b288d1 RDX: ffff888028313d00 RSI: ffffffff81b288ab RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: ffff888028314830 R12: dffffc0000000000 R13: ffffed1017088605 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888124a0d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f887a294e9c CR3: 000000000e184000 CR4: 0000000000350ef0 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1043 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2711 [inline] smp_text_poke_batch_finish+0x27b/0xdb0 arch/x86/kernel/alternative.c:2921 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x376/0x550 kernel/jump_label.c:919 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate mm/kfence/core.c:874 [inline] toggle_allocation_gate+0xfa/0x280 mm/kfence/core.c:866 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3421 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 17424 Comm: syz.0.3767 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:match_held_lock+0x65/0xb0 kernel/locking/lockdep.c:5337 Code: 0a b8 95 48 c1 f8 03 48 0f af c2 0f b7 53 20 5b 81 e2 ff 1f 00 00 48 39 d0 0f 94 c0 0f b6 c0 e9 6c fb 9a f5 b8 01 00 00 00 5b 61 fb 9a f5 31 f6 e8 4f fe ff ff 48 85 c0 75 a7 31 c0 5b e9 4d RSP: 0018:ffffc90000007d00 EFLAGS: 00000046 RAX: 0000000000000001 RBX: ffff88802c1d0ba8 RCX: ffffc90000007d44 RDX: 0000000000000004 RSI: ffff8880336d22c0 RDI: ffff88802c1d0ba8 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: ffff88802c1d0b30 R12: ffff8880336d22c0 R13: ffffc90000007d44 R14: 0000000000000004 R15: 0000000000000004 FS: 0000000000000000(0000) GS:ffff88812490d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c316258 CR3: 000000000e184000 CR4: 0000000000350ef0 Call Trace: find_held_lock+0x2b/0x80 kernel/locking/lockdep.c:5350 __lock_release kernel/locking/lockdep.c:5535 [inline] lock_release+0xe4/0x2d0 kernel/locking/lockdep.c:5889 __raw_spin_unlock include/linux/spinlock_api_smp.h:141 [inline] _raw_spin_unlock+0x16/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] advance_sched+0x62b/0xc80 net/sched/sch_taprio.c:987 __run_hrtimer kernel/time/hrtimer.c:1777 [inline] __hrtimer_run_queues+0x202/0xc40 kernel/time/hrtimer.c:1841 hrtimer_interrupt+0x397/0x8e0 kernel/time/hrtimer.c:1903 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1045 [inline] __sysvec_apic_timer_interrupt+0x10b/0x3c0 arch/x86/kernel/apic/apic.c:1062 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0x9f/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x8/0x20 kernel/kcov.c:320 Code: 00 00 00 e9 2a fe ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 0c 24 <48> 89 f2 48 89 fe bf 07 00 00 00 e9 f8 fd ff ff 0f 1f 84 00 00 00 RSP: 0018:ffffc90003207818 EFLAGS: 00000246 RAX: 1ffffd400048a138 RBX: 0000000000000000 RCX: ffffffff820be0f9 RDX: fffff9400048a139 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00000000000001e0 R08: 0000000000000000 R09: fffff9400048a138 R10: ffffea00024509c7 R11: ffff88802c1d0b30 R12: 00007f3a0e220000 R13: ffff888032071100 R14: dffffc0000000000 R15: ffffea00024509c8 zap_present_ptes mm/memory.c:1701 [inline] do_zap_pte_range mm/memory.c:1810 [inline] zap_pte_range mm/memory.c:1854 [inline] zap_pmd_range mm/memory.c:1946 [inline] zap_pud_range mm/memory.c:1975 [inline] zap_p4d_range mm/memory.c:1996 [inline] unmap_page_range+0x1559/0x43c0 mm/memory.c:2017 unmap_single_vma+0x153/0x240 mm/memory.c:2059 unmap_vmas+0x218/0x470 mm/memory.c:2101 exit_mmap+0x1b0/0xb60 mm/mmap.c:1277 __mmput+0x12a/0x410 kernel/fork.c:1173 mmput+0x62/0x70 kernel/fork.c:1196 exit_mm kernel/exit.c:581 [inline] do_exit+0x7d7/0x2bd0 kernel/exit.c:959 do_group_exit+0xd3/0x2a0 kernel/exit.c:1112 __do_sys_exit_group kernel/exit.c:1123 [inline] __se_sys_exit_group kernel/exit.c:1121 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1121 x64_sys_call+0x151c/0x1740 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f3a0f78f749 Code: Unable to access opcode bytes at 0x7f3a0f78f71f. RSP: 002b:00007ffe7e42d0a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3a0f78f749 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffe7e42d10c R08: 000000047e42d19f R09: 00000000000927c0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000044 R13: 00000000000927c0 R14: 000000000009e40b R15: 00007ffe7e42d160