watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz.6.337:7495] Modules linked in: irq event stamp: 10759145 hardirqs last enabled at (10759144): [] irqentry_exit+0x74/0x90 kernel/entry/common.c:200 hardirqs last disabled at (10759145): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1050 softirqs last enabled at (8745790): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (8745790): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (8745790): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (8745793): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (8745793): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (8745793): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 CPU: 1 UID: 0 PID: 7495 Comm: syz.6.337 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:unwind_next_frame+0x374/0x2390 arch/x86/kernel/unwind_orc.c:505 Code: ea 48 01 d2 48 01 f2 48 bd 00 00 00 00 00 fc ff df 0f 84 37 01 00 00 4c 8d 62 04 4c 8d 6a 05 4c 89 e0 48 c1 e8 03 0f b6 04 28 <84> c0 0f 85 6d 19 00 00 4c 89 e8 48 c1 e8 03 0f b6 04 28 84 c0 0f RSP: 0018:ffffc90000a07bf8 EFLAGS: 00000a06 RAX: 0000000000000000 RBX: ffffffff9027b314 RCX: ffffffff9027b318 RDX: ffffffff90dbce46 RSI: ffffffff90dbce46 RDI: ffffffff8be33d20 RBP: dffffc0000000000 R08: 0000000000000001 R09: ffffffff8172d195 R10: dffffc0000000000 R11: ffffffff81ac4b00 R12: ffffffff90dbce4a R13: ffffffff90dbce4b R14: ffffc90000a07cc8 R15: ffffffff9027b314 FS: 00007f0eb2bf66c0(0000) GS:ffff888125d15000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c366ae2 CR3: 0000000070e10000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:243 [inline] __kasan_slab_free+0x5b/0x80 mm/kasan/common.c:275 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2422 [inline] slab_free mm/slub.c:4695 [inline] kfree+0x18e/0x440 mm/slub.c:4894 ieee80211_inform_bss+0xbd9/0x10a0 net/mac80211/scan.c:160 rdev_inform_bss net/wireless/rdev-ops.h:418 [inline] cfg80211_inform_single_bss_data+0xd05/0x1ac0 net/wireless/scan.c:2380 cfg80211_inform_bss_data+0x1fb/0x3b30 net/wireless/scan.c:3235 cfg80211_inform_bss_frame_data+0x3d7/0x730 net/wireless/scan.c:3326 ieee80211_bss_info_update+0x746/0x9e0 net/mac80211/scan.c:226 ieee80211_scan_rx+0x593/0xa20 net/mac80211/scan.c:355 __ieee80211_rx_handle_packet net/mac80211/rx.c:5186 [inline] ieee80211_rx_list+0x201c/0x2a90 net/mac80211/rx.c:5423 ieee80211_rx_napi+0x1a8/0x3d0 net/mac80211/rx.c:5446 ieee80211_rx include/net/mac80211.h:5210 [inline] ieee80211_handle_queued_frames+0xe8/0x1f0 net/mac80211/main.c:453 tasklet_action_common+0x36c/0x580 kernel/softirq.c:829 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__bpf_prog_run include/linux/filter.h:718 [inline] RIP: 0010:bpf_prog_run include/linux/filter.h:725 [inline] RIP: 0010:bpf_prog_run_array include/linux/bpf.h:2292 [inline] RIP: 0010:trace_call_bpf+0x2f4/0x850 kernel/trace/bpf_trace.c:146 Code: 8b 46 f0 48 89 84 24 80 00 00 00 48 c7 c7 3e b0 a0 8d be bf 02 00 00 e8 2a a3 c6 ff 0f 1f 44 00 00 e8 70 a6 f4 ff 4c 8d 63 30 <4c> 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 RSP: 0018:ffffc9000ca77920 EFLAGS: 00000287 RAX: ffffffff81cb1890 RBX: ffffc90003eb3000 RCX: 0000000000080000 RDX: ffffc9000f0b2000 RSI: 0000000000000d58 RDI: 0000000000000d59 RBP: ffffc9000ca77a18 R08: ffffc9000ca779af R09: 0000000000000000 R10: ffffc9000ca779a0 R11: fffff5200194ef36 R12: ffffc90003eb3030 R13: ffff88804df3d098 R14: ffff88804df3d0a8 R15: 0000000000000001 perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10918 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x2f8/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5879 __mutex_unlock_slowpath+0xcc/0x740 kernel/locking/mutex.c:922 __do_sys_perf_event_open kernel/events/core.c:13721 [inline] __se_sys_perf_event_open+0x194c/0x1d70 kernel/events/core.c:13360 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f0eb498eba9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f0eb2bf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f0eb4bd6090 RCX: 00007f0eb498eba9 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000480 RBP: 00007f0eb4a11e19 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 00007f0eb4bd6128 R14: 00007f0eb4bd6090 R15: 00007ffe3e00b048 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 7241 Comm: kworker/u8:19 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xd33/0x12d0 kernel/smp.c:877 Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 56 63 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 01 5f 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 e5 5e RSP: 0018:ffffc90003067660 EFLAGS: 00000293 RAX: ffffffff81b4601b RBX: 1ffff110170e7f61 RCX: ffff888046a9da00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc900030677e0 R08: ffffffff8fa3a437 R09: 1ffffffff1f47486 R10: dffffc0000000000 R11: fffffbfff1f47487 R12: ffff8880b873fb08 R13: dffffc0000000000 R14: ffff8880b863b1c0 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125c15000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f6c17623fb7 CR3: 000000000df36000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000082 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1044 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2653 [inline] smp_text_poke_batch_finish+0x5f9/0x1130 arch/x86/kernel/alternative.c:2863 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x128/0x250 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xad/0x240 mm/kfence/core.c:850 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3319 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400 kthread+0x70e/0x8a0 kernel/kthread.c:463 ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245