watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.0:28145] Modules linked in: irq event stamp: 10560096 hardirqs last enabled at (10560095): [] asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 hardirqs last disabled at (10560096): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1097 softirqs last enabled at (15658): [] invoke_softirq kernel/softirq.c:432 [inline] softirqs last enabled at (15658): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:636 softirqs last disabled at (15201): [] invoke_softirq kernel/softirq.c:432 [inline] softirqs last disabled at (15201): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:636 CPU: 0 PID: 28145 Comm: syz-executor.0 Not tainted 5.15.0-next-20211109-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:330 [inline] RIP: 0010:rcu_is_watching+0x39/0xb0 kernel/rcu/tree.c:1121 Code: c7 c3 50 aa 03 00 83 f8 07 89 c5 77 77 48 8d 3c ed a0 08 56 8b 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 <75> 51 48 03 1c ed a0 08 56 8b 48 b8 00 00 00 00 00 fc ff df 48 89 RSP: 0018:ffffc90006477ad8 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: 000000000003aa50 RCX: ffffffff815ce368 RDX: 1ffffffff16ac114 RSI: 0000000000000002 RDI: ffffffff8b5608a0 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8d913a97 R10: fffffbfff1b22752 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: ffff888010e77828 R15: 0000000000000000 FS: 00007fccb7ca5700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020e00000 CR3: 000000007764f000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_lock_held_common kernel/rcu/update.c:108 [inline] rcu_read_lock_sched_held+0x1c/0x70 kernel/rcu/update.c:123 trace_lock_acquire include/trace/events/lock.h:13 [inline] lock_acquire+0x442/0x510 kernel/locking/lockdep.c:5608 __might_fault mm/memory.c:5257 [inline] __might_fault+0x104/0x170 mm/memory.c:5242 _copy_from_user+0x27/0x180 lib/usercopy.c:13 copy_from_user include/linux/uaccess.h:192 [inline] copy_from_sockptr_offset include/linux/sockptr.h:48 [inline] tcp_repair_options_est net/ipv4/tcp.c:3111 [inline] do_tcp_setsockopt net/ipv4/tcp.c:3505 [inline] tcp_setsockopt+0x20e2/0x2520 net/ipv4/tcp.c:3655 __sys_setsockopt+0x2db/0x610 net/socket.c:2176 __do_sys_setsockopt net/socket.c:2187 [inline] __se_sys_setsockopt net/socket.c:2184 [inline] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2184 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fccba72fae9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fccb7ca5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007fccba842f60 RCX: 00007fccba72fae9 RDX: 0000000000000016 RSI: 0000000000000006 RDI: 0000000000000004 RBP: 00007fccba789f45 R08: 000000002000019f R09: 0000000000000000 R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffebd5dfbaf R14: 00007fccb7ca5300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8 Comm: kworker/u4:0 Not tainted 5.15.0-next-20211109-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:rep_nop arch/x86/include/asm/vdso/processor.h:13 [inline] RIP: 0010:cpu_relax arch/x86/include/asm/vdso/processor.h:18 [inline] RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline] RIP: 0010:smp_call_function_many_cond+0x440/0xc90 kernel/smp.c:969 Code: e5 01 89 ee e8 f1 78 0b 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 f4 4c 89 f5 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 ab 76 0b 00 f3 90 41 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 95 RSP: 0018:ffffc90000cd79f8 EFLAGS: 00000202 RAX: 0000000000000000 RBX: ffff8880b9c41d40 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffff8880119357c0 RDI: 0000000000000003 RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff816c564b R11: 0000000000000000 R12: ffffed10173883a9 R13: 0000000000000000 R14: ffff8880b9c41d48 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3f1cacf0c0 CR3: 000000000b88e000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1135 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1112 [inline] text_poke_bp_batch+0x1b3/0x560 arch/x86/kernel/alternative.c:1297 text_poke_flush arch/x86/kernel/alternative.c:1451 [inline] text_poke_flush arch/x86/kernel/alternative.c:1448 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1458 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 jump_label_update+0x1d5/0x430 kernel/jump_label.c:830 static_key_enable_cpuslocked+0x1b1/0x260 kernel/jump_label.c:177 static_key_enable+0x16/0x20 kernel/jump_label.c:190 toggle_allocation_gate mm/kfence/core.c:732 [inline] toggle_allocation_gate+0x100/0x390 mm/kfence/core.c:724 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess): 0: c7 c3 50 aa 03 00 mov $0x3aa50,%ebx 6: 83 f8 07 cmp $0x7,%eax 9: 89 c5 mov %eax,%ebp b: 77 77 ja 0x84 d: 48 8d 3c ed a0 08 56 lea -0x74a9f760(,%rbp,8),%rdi 14: 8b 15: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1c: fc ff df 1f: 48 89 fa mov %rdi,%rdx 22: 48 c1 ea 03 shr $0x3,%rdx 26: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) * 2a: 75 51 jne 0x7d <-- trapping instruction 2c: 48 03 1c ed a0 08 56 add -0x74a9f760(,%rbp,8),%rbx 33: 8b 34: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 3b: fc ff df 3e: 48 rex.W 3f: 89 .byte 0x89