watchdog: BUG: soft lockup - CPU#0 stuck for 143s! [syz.4.5:5974] Modules linked in: irq event stamp: 14438583 hardirqs last enabled at (14438582): [] irqentry_exit+0x59e/0x620 kernel/entry/common.c:242 hardirqs last disabled at (14438583): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056 softirqs last enabled at (3698): [] local_bh_disable include/linux/bottom_half.h:20 [inline] softirqs last enabled at (3698): [] __alloc_skb+0x186/0x7d0 net/core/skbuff.c:695 softirqs last disabled at (6401): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (6401): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (6401): [] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 CPU: 0 UID: 0 PID: 5974 Comm: syz.4.5 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:rcu_read_unlock_special+0x1d/0x480 kernel/rcu/tree_plugin.h:773 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 55 41 57 41 56 41 55 41 54 53 48 83 ec 10 65 8b 2d 2b 47 70 11 f7 c5 00 00 f0 00 74 14 <48> 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d e9 00 b0 04 0a cc 49 89 RSP: 0018:ffffc90000007580 EFLAGS: 00000206 RAX: 0000000000000012 RBX: 0000000000000246 RCX: 0000000000000101 RDX: 0000000000000002 RSI: ffffffff8def22aa RDI: ffffffff8c27a880 RBP: ffff888125466000 R08: ffffffff90117db7 R09: 1ffffffff2022fb6 R10: dffffc0000000000 R11: fffffbfff2022fb7 R12: ffffffff8e765e78 R13: dffffc0000000000 R14: ffff8880b863bd98 R15: 1ffff110170c77b3 FS: 00007fd7d22486c0(0000) GS:ffff888125466000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1f04f0a890 CR3: 0000000075faa000 CR4: 00000000003526f0 Call Trace: __rcu_read_unlock+0x83/0xe0 kernel/rcu/tree_plugin.h:438 rcu_read_unlock include/linux/rcupdate.h:883 [inline] class_rcu_destructor include/linux/rcupdate.h:1193 [inline] unwind_next_frame+0x1aaf/0x23c0 arch/x86/kernel/unwind_orc.c:695 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4501 [inline] slab_alloc_node mm/slub.c:4830 [inline] kmem_cache_alloc_node_noprof+0x384/0x690 mm/slub.c:4882 __alloc_skb+0x1d0/0x7d0 net/core/skbuff.c:702 alloc_skb include/linux/skbuff.h:1383 [inline] ndisc_alloc_skb+0x9f/0x480 net/ipv6/ndisc.c:420 ndisc_send_rs+0x2b5/0x630 net/ipv6/ndisc.c:706 addrconf_rs_timer+0x395/0x6d0 net/ipv6/addrconf.c:4041 call_timer_fn+0x192/0x640 kernel/time/timer.c:1748 expire_timers kernel/time/timer.c:1799 [inline] __run_timers kernel/time/timer.c:2373 [inline] __run_timer_base+0x652/0x8b0 kernel/time/timer.c:2385 run_timer_base kernel/time/timer.c:2394 [inline] run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2404 handle_softirqs+0x22a/0x870 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:__schedule+0x15e3/0x5340 kernel/sched/core.c:6918 Code: 04 30 00 00 00 00 4a c7 44 30 08 00 00 00 00 65 48 8b 05 f0 8e 6d 07 48 3b 84 24 a0 01 00 00 0f 85 5d 07 00 00 48 8d 65 d8 5b <41> 5c 41 5d 41 5e 41 5f 5d e9 cf f7 01 00 cc 49 be 00 00 00 00 00 RSP: 0018:ffffc90004d4f3a0 EFLAGS: 00000246 RAX: 6356d0f872184800 RBX: ffff888026f59e40 RCX: 0000000000000002 RDX: 0000000000000000 RSI: ffffffff8c27a860 RDI: ffffffff8c27a820 RBP: ffffc90004d4f3c0 R08: ffffffff90117db7 R09: 1ffffffff2022fb6 R10: dffffc0000000000 R11: fffffbfff2022fb7 R12: ffff888026f59e40 R13: ffff888074fddac0 R14: dffffc0000000000 R15: 1ffff110170c771c preempt_schedule_irq+0x4d/0xa0 kernel/sched/core.c:7234 irqentry_exit+0x599/0x620 kernel/entry/common.c:239 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:crypto_is_moribund crypto/internal.h:195 [inline] RIP: 0010:__crypto_alg_lookup+0x5a/0x480 crypto/api.c:68 Code: 4c 89 74 24 18 c7 44 24 10 fe ff ff ff 49 be 00 00 00 00 00 fc ff df 45 31 ed 4c 8d 7b 20 4c 89 f8 48 c1 e8 03 42 0f b6 04 30 <84> c0 0f 85 81 03 00 00 45 8b 3f 44 89 fe 83 e6 60 31 ff e8 0e 7b RSP: 0018:ffffc90004d4f4f8 EFLAGS: 00000a02 RAX: 0000000000000000 RBX: ffff8881404d8850 RCX: 0000000000080000 RDX: ffffc9000d153000 RSI: 0000000000008a26 RDI: 0000000000008a27 RBP: 000000000000240e R08: ffffffff8ee9d3ef R09: 1ffffffff1dd3a7d R10: dffffc0000000000 R11: fffffbfff1dd3a7e R12: 0000000000000000 R13: 0000000000000000 R14: dffffc0000000000 R15: ffff8881404d8870 crypto_alg_lookup+0x54/0x450 crypto/api.c:264 crypto_larval_lookup crypto/api.c:309 [inline] crypto_alg_mod_lookup+0xf9/0x5f0 crypto/api.c:354 crypto_type_has_alg+0x28/0x60 crypto/algapi.c:1043 xfrm_find_algo net/xfrm/xfrm_algo.c:695 [inline] xfrm_aalg_get_byid+0x1ff/0x290 net/xfrm/xfrm_algo.c:713 pfkey_msg2xfrm_state net/key/af_key.c:1170 [inline] pfkey_add+0xe8f/0x2df0 net/key/af_key.c:1504 pfkey_process net/key/af_key.c:2848 [inline] pfkey_sendmsg+0xc56/0x1120 net/key/af_key.c:3699 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __x64_sys_sendmsg+0x1bd/0x2a0 net/socket.c:2681 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fd7d139c629 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fd7d2248028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fd7d1615fa0 RCX: 00007fd7d139c629 RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 RBP: 00007fd7d1432b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fd7d1616038 R14: 00007fd7d1615fa0 R15: 00007ffd98952848 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xce5/0x12c0 kernel/smp.c:877 Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 74 e2 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 1f de 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 03 de RSP: 0018:ffffc90000117720 EFLAGS: 00000293 RAX: ffffffff81b9ad7d RBX: 1ffff110170c8515 RCX: ffff88801da80000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc90000117860 R08: ffffffff90117db7 R09: 1ffffffff2022fb6 R10: dffffc0000000000 R11: fffffbfff2022fb7 R12: ffff8880b86428a8 R13: dffffc0000000000 R14: ffff8880b873bf80 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888125566000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5cc6e9b15f CR3: 000000000e54c000 CR4: 00000000003526f0 Call Trace: on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1043 on_each_cpu include/linux/smp.h:72 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2746 [inline] smp_text_poke_batch_finish+0x5f5/0x1160 arch/x86/kernel/alternative.c:2956 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x128/0x240 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xab/0x290 mm/kfence/core.c:899 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xb02/0x1830 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245