watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [syz.3.938:4533] Modules linked in: CPU: 1 PID: 4533 Comm: syz.3.938 Tainted: G W syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:__raw_callee_save___pv_queued_spin_unlock+0x10/0x17 Code: 41 51 41 52 41 53 e8 3b 08 00 00 41 5b 41 5a 41 59 41 58 5f 5e 5a 59 5d c3 90 55 48 89 e5 52 b8 01 00 00 00 31 d2 f0 0f b0 17 <3c> 01 75 03 5a 5d c3 56 0f b6 f0 e8 bc ff ff ff 5e 5a 5d c3 0f 1f RSP: 0018:ffffc9000ce7e9b0 EFLAGS: 00000246 RAX: 0000000000000001 RBX: ffff888145b25900 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 000000000007ffff RDI: ffffc9000ce7ee34 RBP: ffffc9000ce7e9b8 R08: 0000000000000004 R09: 0000000000000003 R10: fffff520019cfd2c R11: 1ffff920019cfd2c R12: ffff8881071ee000 R13: dffffc0000000000 R14: ffffc9000ce7ee20 R15: 00000000413899bd FS: 00007ff60722e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c2f2251 CR3: 000000011382e000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: pv_queued_spin_unlock arch/x86/include/asm/paravirt.h:590 [inline] queued_spin_unlock arch/x86/include/asm/qspinlock.h:56 [inline] do_raw_spin_unlock include/linux/spinlock.h:217 [inline] __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:175 [inline] _raw_spin_unlock_bh+0x41/0x60 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:409 [inline] tipc_skb_peek_port net/tipc/msg.h:1258 [inline] tipc_sk_rcv+0x3f3/0x2c60 net/tipc/socket.c:2491 tipc_node_xmit+0x256/0xce0 net/tipc/node.c:1703 tipc_node_xmit_skb+0xe9/0x130 net/tipc/node.c:1768 tipc_sk_rcv+0x1d5d/0x2c60 net/tipc/socket.c:2522 tipc_node_xmit+0x256/0xce0 net/tipc/node.c:1703 tipc_sk_push_backlog net/tipc/socket.c:1316 [inline] tipc_sk_filter_connect net/tipc/socket.c:2255 [inline] tipc_sk_filter_rcv+0x151b/0x2c40 net/tipc/socket.c:2364 tipc_sk_enqueue net/tipc/socket.c:2445 [inline] tipc_sk_rcv+0x7b7/0x2c60 net/tipc/socket.c:2497 tipc_node_xmit+0x256/0xce0 net/tipc/node.c:1703 tipc_node_xmit_skb net/tipc/node.c:1768 [inline] tipc_node_distr_xmit+0x292/0x390 net/tipc/node.c:1783 tipc_sk_backlog_rcv+0x16f/0x1f0 net/tipc/socket.c:2412 sk_backlog_rcv include/net/sock.h:1077 [inline] __release_sock+0x17c/0x3f0 net/core/sock.c:2737 release_sock+0x60/0x1b0 net/core/sock.c:3290 tipc_release+0xd0b/0x1630 net/tipc/socket.c:652 __sock_release net/socket.c:649 [inline] sock_close+0xe0/0x270 net/socket.c:1336 __fput+0x20b/0x8b0 fs/file_table.c:311 ____fput+0x15/0x20 fs/file_table.c:339 task_work_run+0x127/0x190 kernel/task_work.c:188 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop+0xd0/0xe0 kernel/entry/common.c:181 exit_to_user_mode_prepare+0x87/0xd0 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:307 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7ff6087c6749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff60722e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: 00000000000203a0 RBX: 00007ff608a1cfa0 RCX: 00007ff6087c6749 RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 RBP: 00007ff60884af91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ff608a1d038 R14: 00007ff608a1cfa0 R15: 00007ffef3667058 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 3378 Comm: kworker/u4:123 Tainted: G W syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline] RIP: 0010:smp_call_function_many_cond+0x8e5/0x9f0 kernel/smp.c:969 Code: d1 33 0a 00 eb 42 f3 90 48 b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 00 84 c0 75 10 41 f7 07 01 00 00 00 74 1e e8 ab 33 0a 00 da 44 89 f9 80 e1 07 80 c1 03 38 c1 7c e3 4c 89 ff e8 24 b6 48 RSP: 0018:ffffc9000b31f860 EFLAGS: 00000293 RAX: ffffffff815e8ba5 RBX: ffff8881f7038e80 RCX: ffff88811e2cbb40 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc9000b31f978 R08: dffffc0000000000 R09: ffffed103ee271d9 R10: ffffed103ee271d9 R11: 1ffff1103ee271d8 R12: 1ffff1103ee071d0 R13: 1ffff1103ee2784d R14: 0000000000000001 R15: ffff8881f713c268 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fff142f6000 CR3: 000000000660f000 CR4: 00000000003506b0 Call Trace: on_each_cpu_cond_mask+0x43/0x80 kernel/smp.c:1134 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1442 [inline] text_poke_bp_batch+0x1cd/0x5a0 arch/x86/kernel/alternative.c:1642 text_poke_flush arch/x86/kernel/alternative.c:1833 [inline] text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:1840 arch_jump_label_transform_apply+0x15/0x30 arch/x86/kernel/jump_label.c:146 __jump_label_update+0x37c/0x3a0 kernel/jump_label.c:459 jump_label_update+0x39b/0x450 kernel/jump_label.c:830 static_key_disable_cpuslocked+0xc5/0x1a0 kernel/jump_label.c:207 static_key_disable+0x1a/0x30 kernel/jump_label.c:215 toggle_allocation_gate+0x36d/0x410 mm/kfence/core.c:780 process_one_work+0x6be/0xba0 kernel/workqueue.c:2325 worker_thread+0xa59/0x1200 kernel/workqueue.c:2472 kthread+0x411/0x500 kernel/kthread.c:337 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287