ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [kworker/u8:14:3561] Modules linked in: irq event stamp: 623296 hardirqs last enabled at (623295): [] irqentry_exit+0x1dd/0x8c0 kernel/entry/common.c:219 hardirqs last disabled at (623296): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056 softirqs last enabled at (623292): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (623292): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (623292): [] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723 softirqs last disabled at (623275): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (623275): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (623275): [] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723 CPU: 0 UID: 0 PID: 3561 Comm: kworker/u8:14 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xdfd/0x15e0 kernel/smp.c:877 Code: 57 48 8b 54 24 10 4c 89 74 24 10 49 89 d5 48 89 d5 48 89 54 24 18 49 c1 ed 03 83 e5 07 4d 01 e5 83 c5 03 e8 e5 5b 0c 00 f3 90 <41> 0f b6 45 00 40 38 c5 7c 08 84 c0 0f 85 b6 05 00 00 8b 43 08 31 RSP: 0018:ffffc9000c737808 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b8540e00 RCX: ffffffff81b27a51 RDX: ffff888031dedb80 RSI: ffffffff81b27a2b RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: ffff888031dee6b0 R12: dffffc0000000000 R13: ffffed10170a81c1 R14: 0000000000000001 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881248f6000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055e1057aa9c0 CR3: 000000000e184000 CR4: 0000000000350ef0 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1043 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2711 [inline] smp_text_poke_batch_finish+0x27b/0xdb0 arch/x86/kernel/alternative.c:2921 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x376/0x550 kernel/jump_label.c:919 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate mm/kfence/core.c:874 [inline] toggle_allocation_gate+0xfa/0x280 mm/kfence/core.c:866 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3421 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 6020 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:rcu_is_watching_curr_cpu include/linux/context_tracking.h:128 [inline] RIP: 0010:rcu_is_watching+0x1e/0xc0 kernel/rcu/tree.c:751 Code: 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 53 65 ff 05 c3 9e 0f 12 e8 ce bd d3 09 48 c7 c3 e8 d9 b3 93 89 c5 83 f8 07 <0f> 87 82 00 00 00 48 8d 3c ed 20 8f d7 8d 48 b8 00 00 00 00 00 fc RSP: 0018:ffffc90000a08cd8 EFLAGS: 00000097 RAX: 0000000000000001 RBX: ffffffff93b3d9e8 RCX: 0000000000000016 RDX: ffffffff9aebf578 RSI: ffffffff8bf2b600 RDI: ffffffff8bf2b640 RBP: 0000000000000001 R08: 0000000000000001 R09: fffff52000141198 R10: 0000000000000003 R11: ffff88802a34e6b0 R12: ffffffff84b3ad3c R13: dffffc0000000000 R14: ffff888032bfe300 R15: 1ffff920001411ac FS: 0000000000000000(0000) GS:ffff8881249f6000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000000600 CR3: 000000000e184000 CR4: 0000000000350ef0 Call Trace: trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x201/0x2d0 kernel/locking/lockdep.c:5879 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:149 [inline] _raw_spin_unlock_irqrestore+0x1a/0x80 kernel/locking/spinlock.c:194 debug_object_deactivate+0x1ec/0x3a0 lib/debugobjects.c:888 debug_hrtimer_deactivate kernel/time/hrtimer.c:443 [inline] debug_deactivate kernel/time/hrtimer.c:483 [inline] __run_hrtimer kernel/time/hrtimer.c:1745 [inline] __hrtimer_run_queues+0x46f/0xc40 kernel/time/hrtimer.c:1841 hrtimer_interrupt+0x397/0x8e0 kernel/time/hrtimer.c:1903 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1045 [inline] __sysvec_apic_timer_interrupt+0x10b/0x3c0 arch/x86/kernel/apic/apic.c:1062 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0x9f/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x8/0x20 kernel/kcov.c:320 Code: 00 00 00 e9 2a fe ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 0c 24 <48> 89 f2 48 89 fe bf 07 00 00 00 e9 f8 fd ff ff 0f 1f 84 00 00 00 RSP: 0018:ffffc90003537de8 EFLAGS: 00000246 RAX: 1ffff920006a6035 RBX: ffff88802a34db80 RCX: ffffffff817d5386 RDX: ffff88802a34db80 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900035301a8 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: ffff88802a34e6b0 R12: ffffc90003530000 R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc90003537e58 stack_not_used kernel/exit.c:800 [inline] check_stack_usage kernel/exit.c:849 [inline] do_exit+0x15e6/0x2bd0 kernel/exit.c:1006 do_group_exit+0xd3/0x2a0 kernel/exit.c:1112 __do_sys_exit_group kernel/exit.c:1123 [inline] __se_sys_exit_group kernel/exit.c:1121 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1121 x64_sys_call+0x151c/0x1740 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f43cf18f749 Code: Unable to access opcode bytes at 0x7f43cf18f71f. RSP: 002b:00007ffc8c7d7678 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f43cf18f749 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000003 R08: 000000058c7d776f R09: 00007f43cf3b4280 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f43cf3b4280 R14: 0000000000000003 R15: 00007ffc8c7d7730