watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [kworker/u8:8:1163] Modules linked in: irq event stamp: 5949182 hardirqs last enabled at (5949181): [] irqentry_exit_to_kernel_mode_after_preempt include/linux/irq-entry-common.h:515 [inline] hardirqs last enabled at (5949181): [] irqentry_exit_to_kernel_mode include/linux/irq-entry-common.h:550 [inline] hardirqs last enabled at (5949181): [] irqentry_exit+0x246/0x790 kernel/entry/common.c:164 hardirqs last disabled at (5949182): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1061 softirqs last enabled at (5949180): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (5949180): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (5949180): [] __irq_exit_rcu+0x162/0x210 kernel/softirq.c:735 softirqs last disabled at (5949147): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (5949147): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (5949147): [] __irq_exit_rcu+0x162/0x210 kernel/softirq.c:735 CPU: 0 UID: 0 PID: 1163 Comm: kworker/u8:8 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210 Code: 76 67 5b 00 48 89 df 5b e9 bd f2 60 00 be 03 00 00 00 5b e9 f2 71 ef 02 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 65 8b 05 c5 05 02 12 48 8b 34 24 65 48 8b 15 a1 05 02 RSP: 0018:ffffc900055af868 EFLAGS: 00000202 RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffffff81fbee2d RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff8880298e1ec0 RBP: ffff8880b8541080 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000003 R13: ffffed10170a8211 R14: 0000000000000001 R15: ffff8880b843c700 FS: 0000000000000000(0000) GS:ffff888124379000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5ade05b000 CR3: 000000000e596000 CR4: 0000000000350ef0 Call Trace: native_pause arch/x86/include/asm/vdso/processor.h:13 [inline] cpu_relax arch/x86/include/asm/vdso/processor.h:18 [inline] csd_lock_wait kernel/smp.c:342 [inline] smp_call_function_many_cond+0x587/0x1700 kernel/smp.c:892 on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1057 on_each_cpu include/linux/smp.h:72 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2773 [inline] smp_text_poke_batch_finish+0x337/0xc60 arch/x86/kernel/alternative.c:2983 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x37a/0x550 kernel/jump_label.c:910 static_key_enable_cpuslocked+0x1bc/0x270 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate mm/kfence/core.c:906 [inline] toggle_allocation_gate+0xfe/0x2d0 mm/kfence/core.c:898 process_one_work+0xa0e/0x1980 kernel/workqueue.c:3302 process_scheduled_works kernel/workqueue.c:3385 [inline] worker_thread+0x5ef/0xe50 kernel/workqueue.c:3466 kthread+0x370/0x450 kernel/kthread.c:436 ret_from_fork+0x72b/0xd50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 21654 Comm: syz.8.3658 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 RIP: 0010:lockdep_recursion_finish kernel/locking/lockdep.c:470 [inline] RIP: 0010:lock_release kernel/locking/lockdep.c:5891 [inline] RIP: 0010:lock_release+0x17d/0x310 kernel/locking/lockdep.c:5875 Code: 74 0e 8b 05 f5 90 f3 0e 85 c0 0f 84 84 01 00 00 90 48 c7 c7 ea 71 ef 8d e8 00 f0 a3 09 b8 ff ff ff ff 65 0f c1 05 9b 5e 26 12 <83> f8 01 0f 85 28 01 00 00 9c 58 f6 c4 02 0f 85 13 01 00 00 41 f7 RSP: 0018:ffffc90000a08d40 EFLAGS: 00000057 RAX: 0000000000000001 RBX: ffffffff9b430e28 RCX: ffffc90000a08d4c RDX: 0000000000000005 RSI: ffffffff8def71ea RDI: ffffffff8c1c3400 RBP: ffffffff8500c564 R08: 0000000000000001 R09: fffff520001411a2 R10: 0000000000000003 R11: 0000000000000001 R12: ffff8880335f3d80 R13: dffffc0000000000 R14: 0000000000000002 R15: 0000000000000006 FS: 0000000000000000(0000) GS:ffff888124479000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2e508ff8 CR3: 000000000e596000 CR4: 0000000000350ef0 Call Trace: __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:176 [inline] _raw_spin_unlock_irqrestore+0x1a/0x80 kernel/locking/spinlock.c:198 debug_object_deactivate+0x2e4/0x3b0 lib/debugobjects.c:905 debug_hrtimer_deactivate kernel/time/hrtimer.c:490 [inline] __run_hrtimer kernel/time/hrtimer.c:1898 [inline] __hrtimer_run_queues+0x2f0/0xa00 kernel/time/hrtimer.c:1994 hrtimer_interrupt+0x3e5/0x940 kernel/time/hrtimer.c:2113 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] __sysvec_apic_timer_interrupt+0x10b/0x460 arch/x86/kernel/apic/apic.c:1067 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline] sysvec_apic_timer_interrupt+0x9e/0xc0 arch/x86/kernel/apic/apic.c:1061 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:lock_acquire+0x5e/0x370 kernel/locking/lockdep.c:5872 Code: 05 fb 1d 26 12 83 f8 07 0f 87 d9 02 00 00 48 0f a3 05 06 64 f3 0e 0f 82 a4 02 00 00 8b 35 6e 97 f3 0e 85 f6 0f 85 bf 00 00 00 <48> 8b 44 24 30 65 48 2b 05 9d 1d 26 12 0f 85 ed 02 00 00 48 83 c4 RSP: 0018:ffffc90006327670 EFLAGS: 00000206 RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000000000003 RDX: 0000000000000000 RSI: ffffffff8def71ea RDI: ffffffff8c1c3400 RBP: ffffffff8e7e54e0 R08: 00000000acf70bd3 R09: 0000000000000007 R10: 0000000000000200 R11: 0000000000000000 R12: 0000000000000002 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:300 [inline] rcu_read_lock include/linux/rcupdate.h:838 [inline] page_table_check_clear+0x2ae/0x8f0 mm/page_table_check.c:77 __page_table_check_pte_clear+0xf1/0x100 mm/page_table_check.c:155 page_table_check_pte_clear include/linux/page_table_check.h:55 [inline] ptep_get_and_clear_full arch/x86/include/asm/pgtable.h:1263 [inline] get_and_clear_full_ptes include/linux/pgtable.h:845 [inline] zap_present_folio_ptes mm/memory.c:1632 [inline] zap_present_ptes mm/memory.c:1714 [inline] do_zap_pte_range mm/memory.c:1816 [inline] zap_pte_range mm/memory.c:1918 [inline] zap_pmd_range mm/memory.c:2004 [inline] zap_pud_range mm/memory.c:2032 [inline] zap_p4d_range mm/memory.c:2053 [inline] __zap_vma_range+0x2da3/0x4bf0 mm/memory.c:2093 unmap_vmas+0x299/0x5f0 mm/memory.c:2162 exit_mmap+0x1ef/0xa10 mm/mmap.c:1300 __mmput+0x12a/0x410 kernel/fork.c:1178 mmput+0x67/0x80 kernel/fork.c:1201 exit_mm kernel/exit.c:581 [inline] do_exit+0x833/0x2a60 kernel/exit.c:963 do_group_exit+0xd5/0x2a0 kernel/exit.c:1117 __do_sys_exit_group kernel/exit.c:1128 [inline] __se_sys_exit_group kernel/exit.c:1126 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1126 x64_sys_call+0x102c/0x1530 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x10b/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f6ec4d9cdd9 Code: Unable to access opcode bytes at 0x7f6ec4d9cdaf. RSP: 002b:00007ffc40d4ea68 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ec4d9cdd9 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffc40d4eacc R08: 0000000000000000 R09: 00005555648ee9f0 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000005 R13: 00005555648ee9f0 R14: 00000000001a969a R15: 00007ffc40d4eb20