watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.4.2936:15406] Modules linked in: irq event stamp: 10556497 hardirqs last enabled at (10556496): [] irqentry_exit+0x74/0x90 kernel/entry/common.c:214 hardirqs last disabled at (10556497): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1052 softirqs last enabled at (121506): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (121506): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (121506): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723 softirqs last disabled at (121509): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (121509): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (121509): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723 CPU: 1 UID: 0 PID: 15406 Comm: syz.4.2936 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline] RIP: 0010:write_comp_data kernel/kcov.c:246 [inline] RIP: 0010:__sanitizer_cov_trace_switch+0xa9/0x130 kernel/kcov.c:351 Code: c9 eb 08 49 ff c1 4c 39 c8 74 77 4e 8b 54 ce 10 65 44 8b 1d 29 f6 d0 10 41 81 e3 00 01 ff 00 74 13 41 81 fb 00 01 00 00 75 d9 <41> 83 b8 7c 16 00 00 00 74 cf 45 8b 98 58 16 00 00 41 83 fb 03 75 RSP: 0018:ffffc90000a07a58 EFLAGS: 00000246 RAX: 000000000000002b RBX: 0000000000000003 RCX: 0000000000000001 RDX: ffffffff8ad01def RSI: ffffffff8f766900 RDI: 0000000000000003 RBP: ffffc90000a07e70 R08: ffff888066a20000 R09: 0000000000000019 R10: 0000000000000082 R11: 0000000000000100 R12: ffff888027d93e2f R13: ffff888027d93e00 R14: dffffc0000000000 R15: 0000000000000003 FS: 00007f6a0e7ee6c0(0000) GS:ffff888125e0c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4ce8b226d0 CR3: 0000000086b70000 CR4: 00000000003526f0 DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: _ieee802_11_parse_elems_full+0xbaf/0x4550 net/mac80211/parse.c:359 ieee802_11_parse_elems_full+0x125a/0x2ab0 net/mac80211/parse.c:1062 ieee802_11_parse_elems_crc net/mac80211/ieee80211_i.h:2470 [inline] ieee802_11_parse_elems net/mac80211/ieee80211_i.h:2477 [inline] ieee80211_inform_bss+0x10c/0x10a0 net/mac80211/scan.c:79 rdev_inform_bss net/wireless/rdev-ops.h:418 [inline] cfg80211_inform_single_bss_data+0xd05/0x1ac0 net/wireless/scan.c:2385 cfg80211_inform_bss_data+0x203/0x3b40 net/wireless/scan.c:3240 cfg80211_inform_bss_frame_data+0x3d7/0x730 net/wireless/scan.c:3331 ieee80211_bss_info_update+0x749/0x9e0 net/mac80211/scan.c:226 ieee80211_scan_rx+0x593/0xa20 net/mac80211/scan.c:355 __ieee80211_rx_handle_packet net/mac80211/rx.c:5194 [inline] ieee80211_rx_list+0x210c/0x2b90 net/mac80211/rx.c:5447 ieee80211_rx_napi+0x1a8/0x3d0 net/mac80211/rx.c:5470 ieee80211_rx include/net/mac80211.h:5214 [inline] ieee80211_handle_queued_frames+0xe8/0x1f0 net/mac80211/main.c:453 tasklet_action_common+0x36c/0x580 kernel/softirq.c:925 handle_softirqs+0x286/0x870 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:1357 [inline] RIP: 0010:__bpf_prog_run include/linux/filter.h:721 [inline] RIP: 0010:bpf_prog_run include/linux/filter.h:728 [inline] RIP: 0010:bpf_prog_run_array include/linux/bpf.h:2325 [inline] RIP: 0010:trace_call_bpf+0x3ee/0xb50 kernel/trace/bpf_trace.c:145 Code: 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 ef e8 78 36 5a 00 49 83 c7 60 4d 8b 5d 00 48 8b 7c 24 38 4c 89 fe 2e e8 6e 8e 34 1e <41> 89 c5 48 8d 7b 10 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc RSP: 0018:ffffc9000e136a20 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff88807fca6118 RCX: dffffc0000000000 RDX: ffffc9001dc02000 RSI: ffffc9000e5ed060 RDI: ffffe8ffffbbf000 RBP: ffffc9000e136b38 R08: ffffc9000e136acf R09: 0000000000000000 R10: ffffc9000e136ac0 R11: ffffffffa02036d4 R12: ffff88807fca6128 R13: ffffc9000e5ed048 R14: 0000000000000001 R15: ffffc9000e5ed060 perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10931 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x2f8/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5879 rcu_lock_release include/linux/rcupdate.h:341 [inline] rcu_read_unlock include/linux/rcupdate.h:897 [inline] class_rcu_destructor include/linux/rcupdate.h:1195 [inline] unwind_next_frame+0x19a9/0x2390 arch/x86/kernel/unwind_orc.c:680 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:56 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:77 poison_kmalloc_redzone mm/kasan/common.c:400 [inline] __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:417 kasan_kmalloc include/linux/kasan.h:262 [inline] __kmalloc_cache_node_noprof+0x471/0x6f0 mm/slub.c:5760 kmalloc_node_noprof include/linux/slab.h:983 [inline] __get_vm_area_node+0x13f/0x300 mm/vmalloc.c:3182 __vmalloc_node_range_noprof+0x30c/0x12d0 mm/vmalloc.c:3857 __vmalloc_node_noprof mm/vmalloc.c:3960 [inline] vmalloc_noprof+0xb2/0xf0 mm/vmalloc.c:3993 bpf_prog_calc_tag+0x4c/0x370 kernel/bpf/core.c:304 resolve_pseudo_ldimm64+0xbc/0xc50 kernel/bpf/verifier.c:20552 bpf_check+0x1cdf/0x1d210 kernel/bpf/verifier.c:24636 bpf_prog_load+0x13ba/0x19e0 kernel/bpf/syscall.c:3062 __sys_bpf+0x507/0x860 kernel/bpf/syscall.c:6134 __do_sys_bpf kernel/bpf/syscall.c:6244 [inline] __se_sys_bpf kernel/bpf/syscall.c:6242 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6242 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f6a1058eec9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f6a0e7ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f6a107e5fa0 RCX: 00007f6a1058eec9 RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 RBP: 00007f6a10611f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f6a107e6038 R14: 00007f6a107e5fa0 R15: 00007ffe31219218 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 6526 Comm: kworker/u8:11 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:get_current arch/x86/include/asm/current.h:25 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x8/0x70 kernel/kcov.c:216 Code: 8b 3d 24 72 e0 0b 48 89 de 5b e9 43 78 5a 00 cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 04 24 <65> 48 8b 0c 25 08 40 91 92 65 8b 15 28 fc d0 10 81 e2 00 01 ff 00 RSP: 0018:ffffc9001b8ff638 EFLAGS: 00000202 RAX: ffffffff81b4d4cb RBX: 1ffff110170e7ffd RCX: ffff88802d450000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc9001b8ff7c0 R08: ffffffff8f9e1077 R09: 1ffffffff1f3c20e R10: dffffc0000000000 R11: fffffbfff1f3c20f R12: ffff8880b873ffe8 R13: dffffc0000000000 R14: ffff8880b863b240 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125d0c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055556e6005c8 CR3: 000000000df38000 CR4: 00000000003526f0 DR0: 0000200000000300 DR1: 0100000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: csd_lock_wait kernel/smp.c:342 [inline] smp_call_function_many_cond+0xd4b/0x12d0 kernel/smp.c:877 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1043 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2713 [inline] smp_text_poke_batch_finish+0x5f9/0x1130 arch/x86/kernel/alternative.c:2923 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x128/0x250 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xad/0x240 mm/kfence/core.c:852 process_one_work kernel/workqueue.c:3263 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245