watchdog: BUG: soft lockup - CPU#1 stuck for 125s! [syz.1.292:6905] Modules linked in: irq event stamp: 35332675 hardirqs last enabled at (35332674): [] irqentry_exit+0x74/0x90 kernel/entry/common.c:310 hardirqs last disabled at (35332675): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1050 softirqs last enabled at (35136130): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (35136130): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (35136130): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (35136133): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (35136133): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (35136133): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 CPU: 1 UID: 0 PID: 6905 Comm: syz.1.292 Not tainted 6.15.0-syzkaller-gdf3bed9ea576 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:stack_depot_save_flags+0x4/0x900 lib/stackdepot.c:588 Code: 48 c7 c7 90 24 8e 8e 48 89 da e8 57 6f 00 00 eb d9 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa <55> 41 57 41 56 41 55 41 54 53 48 83 ec 40 65 48 8b 05 96 1b a7 0d RSP: 0000:ffffc90000a08598 EFLAGS: 00000246 RAX: 0000000000000028 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000028 RDI: ffffc90000a085a0 RBP: ffffc90000a087d0 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e R10: dffffc0000000000 R11: fffffbfff1f4179f R12: ffffea0001639900 R13: 0000000000000000 R14: ffff888058e65d48 R15: ffffc90000a085a0 FS: 0000000000000000(0000) GS:ffff888125d5f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005620429050f0 CR3: 00000000278b8000 CR4: 00000000003526f0 DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: kasan_save_stack mm/kasan/common.c:48 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2380 [inline] slab_free mm/slub.c:4642 [inline] kmem_cache_free+0x18f/0x400 mm/slub.c:4744 skb_release_data+0x62d/0x7c0 net/core/skbuff.c:1087 skb_release_all net/core/skbuff.c:1152 [inline] napi_consume_skb+0x158/0x1e0 net/core/skbuff.c:1480 __free_old_xmit+0x2c7/0x650 drivers/net/virtio_net.c:-1 virtnet_free_old_xmit drivers/net/virtio_net.c:610 [inline] free_old_xmit drivers/net/virtio_net.c:1045 [inline] virtnet_poll_tx+0x42b/0x1560 drivers/net/virtio_net.c:3196 __napi_poll+0xc7/0x480 net/core/dev.c:7414 napi_poll net/core/dev.c:7478 [inline] net_rx_action+0x707/0xe30 net/core/dev.c:7605 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:7104 Code: 24 20 f6 44 24 21 02 74 0c 90 0f 0b 48 f7 03 08 00 00 00 74 64 bf 01 00 00 00 e8 8b 0a 2b f6 e8 d6 1b 62 f6 fb bf 01 00 00 00 1b ab ff ff 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 8b 44 24 RSP: 0000:ffffc9001baef2a0 EFLAGS: 00000286 RAX: 397de4c12cc8a900 RBX: 0000000000000000 RCX: 397de4c12cc8a900 RDX: 0000000000000006 RSI: ffffffff8d9705ba RDI: 0000000000000001 RBP: ffffc9001baef340 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e R10: dffffc0000000000 R11: fffffbfff1f4179f R12: 0000000000000000 R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff9200375de54 irqentry_exit+0x6f/0x90 kernel/entry/common.c:307 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:hash_64_generic include/linux/hash.h:78 [inline] RIP: 0010:get_bucket lib/debugobjects.c:590 [inline] RIP: 0010:debug_object_activate+0x90/0x420 lib/debugobjects.c:816 Code: 0f 82 d0 02 00 00 f3 0f 1e fa 4c 89 74 24 10 49 be 00 00 00 00 00 fc ff df 48 89 d8 48 c1 e8 0c 48 b9 eb 83 b5 80 46 86 c8 61 <48> 0f af c8 48 c1 e9 2f 83 e1 f8 48 8d 2c c9 48 81 c5 c0 eb c3 99 RSP: 0000:ffffc9001baef400 EFLAGS: 00000a03 RAX: 000ffff88805cd58 RBX: ffff88805cd58ee0 RCX: 61c8864680b583eb RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc9001baef428 RBP: 0000000000000000 R08: ffffc9001baef427 R09: 0000000000000000 R10: ffffc9001baef418 R11: fffff5200375de85 R12: dffffc0000000000 R13: 1ffff9200375de9c R14: dffffc0000000000 R15: 1ffff1100ab9ba2d debug_rcu_head_queue kernel/rcu/rcu.h:236 [inline] __call_rcu_common kernel/rcu/tree.c:3075 [inline] call_rcu+0x95/0x990 kernel/rcu/tree.c:3210 __destroy_inode+0x2da/0x670 fs/inode.c:371 destroy_inode fs/inode.c:394 [inline] evict+0x797/0x9c0 fs/inode.c:834 __dentry_kill+0x209/0x660 fs/dcache.c:669 shrink_kill+0xa9/0x2c0 fs/dcache.c:1114 shrink_dentry_list+0x2e0/0x5e0 fs/dcache.c:1141 shrink_dcache_parent+0xa1/0x2c0 fs/dcache.c:-1 do_one_tree+0x23/0xe0 fs/dcache.c:1604 shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1621 generic_shutdown_super+0x67/0x2c0 fs/super.c:621 kill_anon_super fs/super.c:1280 [inline] kill_litter_super+0x76/0xb0 fs/super.c:1290 deactivate_locked_super+0xbc/0x130 fs/super.c:474 cleanup_mnt+0x425/0x4c0 fs/namespace.c:1417 task_work_run+0x1d4/0x260 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x6ad/0x22e0 kernel/exit.c:955 do_group_exit+0x21c/0x2d0 kernel/exit.c:1104 get_signal+0x1286/0x1340 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x750 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop+0x75/0x110 kernel/entry/common.c:111 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline] do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0eccf8e969 Code: Unable to access opcode bytes at 0x7f0eccf8e93f. RSP: 002b:00007f0ecde73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffea RBX: 00007f0ecd1b5fa0 RCX: 00007f0eccf8e969 RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 RBP: 00007f0ecd010ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f0ecd1b5fa0 R15: 00007ffd82e12548 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 6708 Comm: kworker/u8:18 Not tainted 6.15.0-syzkaller-gdf3bed9ea576 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline] RIP: 0010:smp_call_function_many_cond+0xf6e/0x12d0 kernel/smp.c:885 Code: 89 ee 83 e6 01 31 ff e8 60 78 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 0b 74 0b 00 eb 37 f3 90 43 0f b6 04 2c <84> c0 75 10 41 f7 07 01 00 00 00 74 1e e8 f0 73 0b 00 eb e5 44 89 RSP: 0018:ffffc9000f8476a0 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b863cb40 RCX: ffff888027e3bc00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc9000f847800 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e R10: dffffc0000000000 R11: fffffbfff1f4179f R12: 1ffff110170e828d R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8880b8741468 FS: 0000000000000000(0000) GS:ffff888125c5f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcd910e56e8 CR3: 000000000df36000 CR4: 00000000003526f0 DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1052 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2660 [inline] smp_text_poke_batch_finish+0x5e0/0x1100 arch/x86/kernel/alternative.c:2870 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_disable_cpuslocked+0xc5/0x1b0 kernel/jump_label.c:240 static_key_disable+0x1a/0x20 kernel/jump_label.c:248 toggle_allocation_gate+0x1a1/0x240 mm/kfence/core.c:855 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x711/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245