watchdog: BUG: soft lockup - CPU#0 stuck for 144s! [syz.2.28:6057] Modules linked in: irq event stamp: 13426425 hardirqs last enabled at (13426424): [] irqentry_exit+0x59c/0x620 kernel/entry/common.c:219 hardirqs last disabled at (13426425): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056 softirqs last enabled at (10054864): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (10054864): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (10054864): [] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 softirqs last disabled at (10054867): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (10054867): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (10054867): [] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 CPU: 0 UID: 0 PID: 6057 Comm: syz.2.28 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 RIP: 0010:orc_ip arch/x86/kernel/unwind_orc.c:81 [inline] RIP: 0010:__orc_find arch/x86/kernel/unwind_orc.c:103 [inline] RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:238 [inline] RIP: 0010:unwind_next_frame+0x513/0x23c0 arch/x86/kernel/unwind_orc.c:510 Code: c1 e8 3f 48 01 c8 48 83 e0 fe 4c 8d 3c 45 00 00 00 00 49 01 ef 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 <84> c0 75 27 49 63 07 4c 01 f8 49 8d 4f 04 4c 39 e0 48 0f 46 e9 49 RSP: 0018:ffffc90000007578 EFLAGS: 00000a02 RAX: 0000000000000000 RBX: ffffffff90567700 RCX: dffffc0000000000 RDX: ffffffff90567700 RSI: ffffffff910a873a RDI: ffffffff8be73da0 RBP: ffffffff90567700 R08: 0000000000000001 R09: ffffffff8e35a320 R10: ffffc90000007148 R11: fffff52000000e2b R12: ffffffff8b781161 R13: ffffffff90567700 R14: ffffc90000007648 R15: ffffffff90567700 FS: 00007f3b2d3ba6c0(0000) GS:ffff888125929000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31a11ff8 CR3: 000000002826c000 CR4: 00000000003526f0 Call Trace: arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_node_noprof+0x427/0x6f0 mm/slub.c:5315 __alloc_skb+0x1d7/0x390 net/core/skbuff.c:679 __netdev_alloc_skb+0xc1/0x850 net/core/skbuff.c:754 netdev_alloc_skb include/linux/skbuff.h:3484 [inline] dev_alloc_skb include/linux/skbuff.h:3497 [inline] __ieee80211_beacon_get+0xc06/0x1880 net/mac80211/tx.c:5656 ieee80211_beacon_get_tim+0xbd/0x2c0 net/mac80211/tx.c:5778 ieee80211_beacon_get include/net/mac80211.h:5669 [inline] mac80211_hwsim_beacon_tx+0x3c5/0x870 drivers/net/wireless/virtual/mac80211_hwsim.c:2361 __iterate_interfaces+0x2ab/0x590 net/mac80211/util.c:761 ieee80211_iterate_active_interfaces_atomic+0xdb/0x180 net/mac80211/util.c:797 mac80211_hwsim_beacon+0xbb/0x180 drivers/net/wireless/virtual/mac80211_hwsim.c:2395 __run_hrtimer kernel/time/hrtimer.c:1777 [inline] __hrtimer_run_queues+0x527/0xc30 kernel/time/hrtimer.c:1841 hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1858 handle_softirqs+0x22a/0x7c0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:preempt_schedule_irq+0x48/0xa0 kernel/sched/core.c:7190 Code: 49 be 00 00 00 00 00 fc ff df eb 09 48 f7 03 10 00 00 00 74 53 bf 01 00 00 00 e8 03 0c 18 f6 e8 1e 94 50 f6 fb bf 01 00 00 00 e3 a9 ff ff 9c 58 fa a9 00 02 00 00 74 05 e8 a4 95 50 f6 bf 01 RSP: 0018:ffffc9000b1f72d0 EFLAGS: 00000206 RAX: 0000000000020fe7 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff8dad31a6 RDI: 0000000000000001 RBP: 0000000000000000 R08: ffffffff8fced377 R09: 1ffffffff1f9da6e R10: dffffc0000000000 R11: fffffbfff1f9da6f R12: 0000000000000000 R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000 irqentry_exit+0x597/0x620 kernel/entry/common.c:216 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:clear_page_erms+0xb/0x20 arch/x86/lib/clear_page_64.S:52 Code: 48 8d 7f 40 75 d9 90 e9 83 55 04 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa b9 00 10 00 00 31 c0 aa c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc9000b1f73f0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000000b40 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888068c4b4c0 RBP: 1ffffffff1baeea6 R08: ffffffff8fced377 R09: 0000000000000000 R10: ffffed100d188000 R11: fffffbfff1f9da6f R12: fffa800068c4b000 R13: fffa800000000000 R14: 1ffffffff1baeea4 R15: 0000000000000035 clear_page arch/x86/include/asm/page_64.h:65 [inline] clear_highpage_kasan_tagged include/linux/highmem.h:248 [inline] kernel_init_pages mm/page_alloc.c:1239 [inline] post_alloc_hook+0x1b6/0x280 mm/page_alloc.c:1855 prep_new_page mm/page_alloc.c:1865 [inline] get_page_from_freelist+0x24dc/0x2580 mm/page_alloc.c:3915 __alloc_frozen_pages_noprof+0x18d/0x380 mm/page_alloc.c:5210 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2486 ___kmalloc_large_node+0x4e/0x150 mm/slub.c:5598 __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:5629 __do_kmalloc_node mm/slub.c:5645 [inline] __kvmalloc_node_noprof+0x6e/0x8d0 mm/slub.c:7136 netlink_alloc_large_skb+0x62/0x110 net/netlink/af_netlink.c:1186 netlink_sendmsg+0x5d4/0xb40 net/netlink/af_netlink.c:1869 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:742 ____sys_sendmsg+0x4d7/0x810 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __x64_sys_sendmsg+0x1bd/0x2a0 net/socket.c:2681 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f3b2c59acb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3b2d3ba028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f3b2c815fa0 RCX: 00007f3b2c59acb9 RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000e RBP: 00007f3b2c608bf7 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f3b2c816038 R14: 00007f3b2c815fa0 R15: 00007ffd17bb9248 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xce5/0x1270 kernel/smp.c:877 Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 94 b4 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 3f b0 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 23 b0 RSP: 0000:ffffc900001176a0 EFLAGS: 00000293 RAX: ffffffff81b6d14d RBX: 1ffff110170c856d RCX: ffff88801cafdb80 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc900001177e0 R08: ffffffff8fced377 R09: 1ffffffff1f9da6e R10: dffffc0000000000 R11: fffffbfff1f9da6f R12: ffff8880b8642b68 R13: dffffc0000000000 R14: ffff8880b873bb00 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888125a29000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fedb29e5f70 CR3: 000000000e146000 CR4: 00000000003526f0 Call Trace: on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1043 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2711 [inline] smp_text_poke_batch_finish+0x5f5/0x1160 arch/x86/kernel/alternative.c:2921 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x128/0x240 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xab/0x250 mm/kfence/core.c:874 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xaec/0x17a0 kernel/workqueue.c:3340 worker_thread+0x89f/0xd90 kernel/workqueue.c:3421 kthread+0x726/0x8b0 kernel/kthread.c:463 ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246