watchdog: BUG: soft lockup - CPU#1 stuck for 3513328309s! [syz-executor.3:2097] Modules linked in: irq event stamp: 3837950 hardirqs last enabled at (3837949): [] _flat_send_IPI_mask+0xf2/0x190 arch/x86/kernel/apic/apic_flat_64.c:57 hardirqs last disabled at (3837950): [] sysvec_apic_timer_interrupt+0xa/0xb0 arch/x86/kernel/apic/apic.c:1097 softirqs last enabled at (293974): [] __irq_exit_rcu+0xec/0x170 kernel/softirq.c:637 softirqs last disabled at (293887): [] __irq_exit_rcu+0xec/0x170 kernel/softirq.c:637 CPU: 1 PID: 2097 Comm: syz-executor.3 Tainted: G S 5.18.0-rc3-syzkaller-00196-g45ab9400e73f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:msr_write+0x21f/0x330 arch/x86/kernel/msr.c:139 Code: 04 2c 84 c0 75 3f 8b 5c 24 60 48 8b 44 24 28 42 0f b6 04 28 84 c0 75 48 8b 4c 24 64 44 89 ff 8b 74 24 14 89 da e8 31 18 23 03 <85> c0 4c 8b 6c 24 30 75 55 49 83 c6 08 4c 39 74 24 18 48 8d 7c 24 RSP: 0018:ffffc900102e7bc0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000040000 RDX: ffffc9000c0fb000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: ffffc900102e7c90 R08: ffffffff845ae4b9 R09: ffffed10173475a1 R10: ffffed10173475a1 R11: 1ffff110173475a0 R12: 1ffff9200205cf84 R13: dffffc0000000000 R14: 0000000000e75098 R15: 0000000000000000 FS: 00007f4580340700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020e75000 CR3: 0000000020206000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_iter_write+0x4ed/0x7a0 fs/read_write.c:854 vfs_writev fs/read_write.c:925 [inline] do_pwritev+0x219/0x360 fs/read_write.c:1022 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f457f2890e9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f4580340168 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 RAX: ffffffffffffffda RBX: 00007f457f39bf60 RCX: 00007f457f2890e9 RDX: 0000000000000002 RSI: 0000000020000100 RDI: 0000000000000004 RBP: 00007f457f2e308d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000010 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd8063794f R14: 00007f4580340300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 8650 Comm: kworker/u4:9 Tainted: G S 5.18.0-rc3-syzkaller-00196-g45ab9400e73f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:411 [inline] RIP: 0010:smp_call_function_many_cond+0xf17/0x1500 kernel/smp.c:969 Code: fe 83 e6 01 31 ff e8 58 3e 0c 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 08 e8 23 3a 0c 00 eb 46 90 f3 90 42 0f b6 04 3b <84> c0 75 11 41 f7 04 24 01 00 00 00 74 2b e8 06 3a 0c 00 eb e4 44 RSP: 0018:ffffc9001516f780 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 1ffff11017367d39 RCX: ffff88801ff41d80 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc9001516f940 R08: ffffffff8179c4d8 R09: fffffbfff1f61df9 R10: fffffbfff1f61df9 R11: 1ffffffff1f61df8 R12: ffff8880b9b3e9c8 R13: 1ffff11017347598 R14: 0000000000000001 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc78c7691b8 CR3: 000000000c88e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: on_each_cpu_cond_mask+0x3b/0x80 kernel/smp.c:1135 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:1184 [inline] text_poke_bp_batch+0x31d/0x960 arch/x86/kernel/alternative.c:1372 text_poke_flush arch/x86/kernel/alternative.c:1542 [inline] text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1549 arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146 static_key_disable_cpuslocked+0xc8/0x1b0 kernel/jump_label.c:207 static_key_disable+0x16/0x20 kernel/jump_label.c:215 toggle_allocation_gate+0x3d8/0x470 mm/kfence/core.c:778 process_one_work+0x81c/0xd10 kernel/workqueue.c:2289 worker_thread+0xb14/0x1330 kernel/workqueue.c:2436 kthread+0x266/0x300 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 ---------------- Code disassembly (best guess): 0: 04 2c add $0x2c,%al 2: 84 c0 test %al,%al 4: 75 3f jne 0x45 6: 8b 5c 24 60 mov 0x60(%rsp),%ebx a: 48 8b 44 24 28 mov 0x28(%rsp),%rax f: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax 14: 84 c0 test %al,%al 16: 75 48 jne 0x60 18: 8b 4c 24 64 mov 0x64(%rsp),%ecx 1c: 44 89 ff mov %r15d,%edi 1f: 8b 74 24 14 mov 0x14(%rsp),%esi 23: 89 da mov %ebx,%edx 25: e8 31 18 23 03 callq 0x323185b * 2a: 85 c0 test %eax,%eax <-- trapping instruction 2c: 4c 8b 6c 24 30 mov 0x30(%rsp),%r13 31: 75 55 jne 0x88 33: 49 83 c6 08 add $0x8,%r14 37: 4c 39 74 24 18 cmp %r14,0x18(%rsp) 3c: 48 rex.W 3d: 8d .byte 0x8d 3e: 7c 24 jl 0x64