RBP: 00007f4881db7da0 R08: 0000000000000001 R09: 000000079965753f R10: 0000001b32d20000 R11: 0000000000000246 R12: 00007f4881db5fac R13: 00007f4881db5fa0 R14: ffffffffffffffff R15: 00007fff99657360 watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [syz.0.3479:18195] Modules linked in: irq event stamp: 976086 hardirqs last enabled at (976085): [] irqentry_exit+0x3b/0x90 kernel/entry/common.c:200 hardirqs last disabled at (976086): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1050 softirqs last enabled at (976084): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (976084): [] handle_softirqs+0x5be/0x8e0 kernel/softirq.c:607 softirqs last disabled at (975919): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (975919): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (975919): [] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:680 CPU: 1 UID: 0 PID: 18195 Comm: syz.0.3479 Not tainted 6.17.0-rc1-syzkaller-00111-g24ea63ea3877 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xdfd/0x1600 kernel/smp.c:877 Code: 57 48 8b 54 24 10 4c 89 74 24 10 49 89 d5 48 89 d5 48 89 54 24 18 49 c1 ed 03 83 e5 07 4d 01 e5 83 c5 03 e8 65 05 0c 00 f3 90 <41> 0f b6 45 00 40 38 c5 7c 08 84 c0 0f 85 e0 05 00 00 8b 43 08 31 RSP: 0018:ffffc90003d6f9a8 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b8441ec0 RCX: ffffffff81af8d51 RDX: ffff888034ad0000 RSI: ffffffff81af8d2b RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 R13: ffffed10170883d9 R14: 0000000000000001 R15: 0000000000000000 FS: 00005555645e9500(0000) GS:ffff8881247bf000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c272205 CR3: 000000007679d000 CR4: 0000000000350ef0 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1044 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2653 [inline] smp_text_poke_batch_finish+0x27b/0xdb0 arch/x86/kernel/alternative.c:2863 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x376/0x550 kernel/jump_label.c:919 static_key_disable_cpuslocked+0x158/0x1c0 kernel/jump_label.c:240 static_key_disable+0x1a/0x20 kernel/jump_label.c:248 tracepoint_remove_func kernel/tracepoint.c:370 [inline] tracepoint_probe_unregister+0x4fd/0xd70 kernel/tracepoint.c:504 bpf_raw_tp_link_release+0x35/0x70 kernel/bpf/syscall.c:3655 bpf_link_free+0xec/0x390 kernel/bpf/syscall.c:3166 bpf_link_put_direct kernel/bpf/syscall.c:3209 [inline] bpf_link_release+0x5d/0x80 kernel/bpf/syscall.c:3216 __fput+0x402/0xb70 fs/file_table.c:468 task_work_run+0x150/0x240 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop+0xeb/0x110 kernel/entry/common.c:43 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline] do_syscall_64+0x3f6/0x4c0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4881b8ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff99657248 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 RAX: 0000000000000000 RBX: 000000000015cb0f RCX: 00007f4881b8ebe9 RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 RBP: 00007f4881db7da0 R08: 0000000000000001 R09: 000000079965753f R10: 0000001b32d20000 R11: 0000000000000246 R12: 00007f4881db5fac R13: 00007f4881db5fa0 R14: ffffffffffffffff R15: 00007fff99657360 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 669 Comm: kworker/u8:5 Not tainted 6.17.0-rc1-syzkaller-00111-g24ea63ea3877 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: events_unbound nsim_dev_trap_report_work RIP: 0010:rol32 include/linux/bitops.h:126 [inline] RIP: 0010:iterate_chain_key kernel/locking/lockdep.c:451 [inline] RIP: 0010:__lock_acquire+0x668/0x1ce0 kernel/locking/lockdep.c:5225 Code: b7 44 24 10 8b 7c 24 28 44 8b 74 24 20 c1 e0 0d 66 0b 04 24 98 29 f8 8b 7c 24 18 31 f8 89 c2 41 29 c6 01 c8 c1 c2 06 41 31 d6 <44> 89 f2 44 29 f1 41 01 c6 c1 c2 08 31 d1 89 ca 29 c8 44 01 f1 c1 RSP: 0018:ffffc90000007c38 EFLAGS: 00000086 RAX: 00000000fffff3bf RBX: ffff8880253d28f0 RCX: 00000000fffffffe RDX: 00000000fffcf07f RSI: ffff8880253d2990 RDI: 00000000ffffffff RBP: 0000000000000000 R08: 0000000000080000 R09: 0000000000000001 R10: 0000000000000004 R11: 0000000000000000 R12: ffff8880253d2990 R13: ffff8880253d1e00 R14: 00000000fffcfc41 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8881246bf000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000000ee030 CR3: 000000007679d000 CR4: 0000000000350ef0 Call Trace: lock_acquire kernel/locking/lockdep.c:5868 [inline] lock_acquire+0x179/0x350 kernel/locking/lockdep.c:5825 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] advance_sched+0xd9/0xc80 net/sched/sch_taprio.c:929 __run_hrtimer kernel/time/hrtimer.c:1761 [inline] __hrtimer_run_queues+0x202/0xad0 kernel/time/hrtimer.c:1825 hrtimer_interrupt+0x397/0x8e0 kernel/time/hrtimer.c:1887 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1039 [inline] __sysvec_apic_timer_interrupt+0x10b/0x3f0 arch/x86/kernel/apic/apic.c:1056 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0x9f/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:kasan_poison+0x32/0x50 mm/kasan/shadow.c:146 Code: c7 07 75 2e 40 f6 c6 07 75 31 48 8d 14 37 48 89 f9 48 be 00 00 00 00 00 fc ff df 48 c1 e9 03 48 c1 ea 03 48 8d 3c 31 48 29 ca <0f> b6 f0 e9 56 a2 70 09 90 0f 0b 90 e9 28 44 ef fe 90 0f 0b 90 e9 RSP: 0018:ffffc900030f7ad0 EFLAGS: 00000216 RAX: 00000000000000fb RBX: ffff88802e3d1640 RCX: 1ffff11005c7a2c8 RDX: 000000000000001e RSI: dffffc0000000000 RDI: ffffed1005c7a2c8 RBP: ffff88801f6b88c0 R08: 0000000000000140 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff88801f6b88c0 R13: 0000000000212110 R14: ffffea0000b8f440 R15: 0000000000000000 poison_slab_object mm/kasan/common.c:239 [inline] __kasan_slab_free+0x55/0x70 mm/kasan/common.c:275 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2417 [inline] slab_free mm/slub.c:4680 [inline] kmem_cache_free+0x2d1/0x4d0 mm/slub.c:4782 kfree_skbmem+0x1a4/0x1f0 net/core/skbuff.c:1109 __kfree_skb net/core/skbuff.c:1166 [inline] consume_skb net/core/skbuff.c:1397 [inline] consume_skb+0xcc/0x100 net/core/skbuff.c:1391 nsim_dev_trap_report drivers/net/netdevsim/dev.c:836 [inline] nsim_dev_trap_report_work+0x8bd/0xcf0 drivers/net/netdevsim/dev.c:866 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245