watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [syz.3.938:4533]
Modules linked in:
CPU: 1 PID: 4533 Comm: syz.3.938 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:__raw_callee_save___pv_queued_spin_unlock+0x10/0x17
Code: 41 51 41 52 41 53 e8 3b 08 00 00 41 5b 41 5a 41 59 41 58 5f 5e 5a 59 5d c3 90 55 48 89 e5 52 b8 01 00 00 00 31 d2 f0 0f b0 17 <3c> 01 75 03 5a 5d c3 56 0f b6 f0 e8 bc ff ff ff 5e 5a 5d c3 0f 1f
RSP: 0018:ffffc9000ce7e9b0 EFLAGS: 00000246
RAX: 0000000000000001 RBX: ffff888145b25900 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 000000000007ffff RDI: ffffc9000ce7ee34
RBP: ffffc9000ce7e9b8 R08: 0000000000000004 R09: 0000000000000003
R10: fffff520019cfd2c R11: 1ffff920019cfd2c R12: ffff8881071ee000
R13: dffffc0000000000 R14: ffffc9000ce7ee20 R15: 00000000413899bd
FS: 00007ff60722e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c2f2251 CR3: 000000011382e000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
pv_queued_spin_unlock arch/x86/include/asm/paravirt.h:590 [inline]
queued_spin_unlock arch/x86/include/asm/qspinlock.h:56 [inline]
do_raw_spin_unlock include/linux/spinlock.h:217 [inline]
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:175 [inline]
_raw_spin_unlock_bh+0x41/0x60 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:409 [inline]
tipc_skb_peek_port net/tipc/msg.h:1258 [inline]
tipc_sk_rcv+0x3f3/0x2c60 net/tipc/socket.c:2491
tipc_node_xmit+0x256/0xce0 net/tipc/node.c:1703
tipc_node_xmit_skb+0xe9/0x130 net/tipc/node.c:1768
tipc_sk_rcv+0x1d5d/0x2c60 net/tipc/socket.c:2522
tipc_node_xmit+0x256/0xce0 net/tipc/node.c:1703
tipc_sk_push_backlog net/tipc/socket.c:1316 [inline]
tipc_sk_filter_connect net/tipc/socket.c:2255 [inline]
tipc_sk_filter_rcv+0x151b/0x2c40 net/tipc/socket.c:2364
tipc_sk_enqueue net/tipc/socket.c:2445 [inline]
tipc_sk_rcv+0x7b7/0x2c60 net/tipc/socket.c:2497
tipc_node_xmit+0x256/0xce0 net/tipc/node.c:1703
tipc_node_xmit_skb net/tipc/node.c:1768 [inline]
tipc_node_distr_xmit+0x292/0x390 net/tipc/node.c:1783
tipc_sk_backlog_rcv+0x16f/0x1f0 net/tipc/socket.c:2412
sk_backlog_rcv include/net/sock.h:1077 [inline]
__release_sock+0x17c/0x3f0 net/core/sock.c:2737
release_sock+0x60/0x1b0 net/core/sock.c:3290
tipc_release+0xd0b/0x1630 net/tipc/socket.c:652
__sock_release net/socket.c:649 [inline]
sock_close+0xe0/0x270 net/socket.c:1336
__fput+0x20b/0x8b0 fs/file_table.c:311
____fput+0x15/0x20 fs/file_table.c:339
task_work_run+0x127/0x190 kernel/task_work.c:188
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop+0xd0/0xe0 kernel/entry/common.c:181
exit_to_user_mode_prepare+0x87/0xd0 kernel/entry/common.c:214
__syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:307
do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7ff6087c6749
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ff60722e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: 00000000000203a0 RBX: 00007ff608a1cfa0 RCX: 00007ff6087c6749
RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003
RBP: 00007ff60884af91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ff608a1d038 R14: 00007ff608a1cfa0 R15: 00007ffef3667058
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 3378 Comm: kworker/u4:123 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline]
RIP: 0010:smp_call_function_many_cond+0x8e5/0x9f0 kernel/smp.c:969
Code: d1 33 0a 00 eb 42 f3 90 48 b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 00 84 c0 75 10 41 f7 07 01 00 00 00 74 1e e8 ab 33 0a 00 da 44 89 f9 80 e1 07 80 c1 03 38 c1 7c e3 4c 89 ff e8 24 b6 48
RSP: 0018:ffffc9000b31f860 EFLAGS: 00000293
RAX: ffffffff815e8ba5 RBX: ffff8881f7038e80 RCX: ffff88811e2cbb40
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc9000b31f978 R08: dffffc0000000000 R09: ffffed103ee271d9
R10: ffffed103ee271d9 R11: 1ffff1103ee271d8 R12: 1ffff1103ee071d0
R13: 1ffff1103ee2784d R14: 0000000000000001 R15: ffff8881f713c268
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fff142f6000 CR3: 000000000660f000 CR4: 00000000003506b0
Call Trace:
on_each_cpu_cond_mask+0x43/0x80 kernel/smp.c:1134
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:1442 [inline]
text_poke_bp_batch+0x1cd/0x5a0 arch/x86/kernel/alternative.c:1642
text_poke_flush arch/x86/kernel/alternative.c:1833 [inline]
text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:1840
arch_jump_label_transform_apply+0x15/0x30 arch/x86/kernel/jump_label.c:146
__jump_label_update+0x37c/0x3a0 kernel/jump_label.c:459
jump_label_update+0x39b/0x450 kernel/jump_label.c:830
static_key_disable_cpuslocked+0xc5/0x1a0 kernel/jump_label.c:207
static_key_disable+0x1a/0x30 kernel/jump_label.c:215
toggle_allocation_gate+0x36d/0x410 mm/kfence/core.c:780
process_one_work+0x6be/0xba0 kernel/workqueue.c:2325
worker_thread+0xa59/0x1200 kernel/workqueue.c:2472
kthread+0x411/0x500 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287