watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [kworker/u4:0:8] Modules linked in: irq event stamp: 92062 hardirqs last enabled at (92061): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] hardirqs last enabled at (92061): [] _raw_spin_unlock_irq+0x1f/0x40 kernel/locking/spinlock.c:202 hardirqs last disabled at (92062): [] __schedule+0x290d/0x52c0 kernel/sched/core.c:6409 softirqs last enabled at (88696): [] invoke_softirq kernel/softirq.c:445 [inline] softirqs last enabled at (88696): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 softirqs last disabled at (88053): [] invoke_softirq kernel/softirq.c:445 [inline] softirqs last disabled at (88053): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 CPU: 1 PID: 8 Comm: kworker/u4:0 Not tainted 6.0.0-rc2-next-20220825-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:27 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:166 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:200 Code: 48 89 ef 5d e9 d1 08 34 00 5d be 03 00 00 00 e9 76 57 82 02 66 0f 1f 44 00 00 48 8b be a8 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 <65> 8b 05 39 65 86 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b RSP: 0018:ffffc900000d7940 EFLAGS: 00000202 RAX: 0000000000000000 RBX: ffff8880b9a42800 RCX: ffffffff81715df7 RDX: ffff88813fe757c0 RSI: 0000000000000000 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffffed1017348501 R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f02a38dc4a6 CR3: 000000000bc8e000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rep_nop arch/x86/include/asm/vdso/processor.h:13 [inline] cpu_relax arch/x86/include/asm/vdso/processor.h:18 [inline] csd_lock_wait kernel/smp.c:413 [inline] smp_call_function_many_cond+0x5c1/0x1430 kernel/smp.c:987 on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1153 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1302 [inline] text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1490 text_poke_flush arch/x86/kernel/alternative.c:1660 [inline] text_poke_flush arch/x86/kernel/alternative.c:1657 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1667 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 jump_label_update+0x32f/0x410 kernel/jump_label.c:801 static_key_enable_cpuslocked+0x1b1/0x260 kernel/jump_label.c:177 static_key_enable+0x16/0x20 kernel/jump_label.c:190 toggle_allocation_gate mm/kfence/core.c:811 [inline] toggle_allocation_gate+0x100/0x390 mm/kfence/core.c:803 process_one_work+0x991/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 3273 Comm: kworker/0:3 Not tainted 6.0.0-rc2-next-20220825-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 Workqueue: events p9_read_work RIP: 0010:halt arch/x86/include/asm/irqflags.h:99 [inline] RIP: 0010:kvm_wait+0xc1/0x100 arch/x86/kernel/kvm.c:1060 Code: f4 48 83 c4 10 c3 89 74 24 0c 48 89 3c 24 e8 06 fd 4c 00 8b 74 24 0c 48 8b 3c 24 e9 6a ff ff ff 66 90 0f 00 2d 10 47 b4 08 f4 bf 89 74 24 0c 48 89 3c 24 e8 90 24 93 00 8b 74 24 0c 48 8b 3c RSP: 0018:ffffc9000338f998 EFLAGS: 00000046 RAX: 0000000000000003 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88807dcac800 RBP: ffff88807dcac800 R08: 0000000000000001 R09: ffff88807dcac800 R10: ffffed100fb95900 R11: 0000000000000001 R12: 0000000000000000 R13: ffffed100fb95900 R14: 0000000000000001 R15: ffff8880b9a3adc0 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020011000 CR3: 0000000011b88000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: pv_wait arch/x86/include/asm/paravirt.h:603 [inline] pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:470 [inline] __pv_queued_spin_lock_slowpath+0x8c7/0xb50 kernel/locking/qspinlock.c:511 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:591 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0x200/0x2a0 kernel/locking/spinlock_debug.c:115 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] _raw_spin_lock_irqsave+0x41/0x50 kernel/locking/spinlock.c:162 p9_tag_remove net/9p/client.c:367 [inline] p9_req_put net/9p/client.c:375 [inline] p9_req_put+0xc6/0x250 net/9p/client.c:372 p9_conn_cancel+0x640/0x970 net/9p/trans_fd.c:213 p9_read_work+0x514/0x10c0 net/9p/trans_fd.c:403 process_one_work+0x991/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306